docx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The file
ooxml/scripts/unpack.pyuseszipfile.ZipFile.extractall()without validating archive members, which is vulnerable to Zip Slip attacks, potentially allowing a malicious document to write files to arbitrary locations. - COMMAND_EXECUTION (MEDIUM): The file
ooxml/scripts/pack.pyusessubprocess.runto execute thesofficecommand, which is a command execution surface that depends on an external binary. - PROMPT_INJECTION (LOW): The skill has an indirect prompt injection surface. Ingestion points:
ooxml/scripts/unpack.py(extracts docx/pptx/xlsx) andooxml/scripts/validation/docx.py(parses XML). Boundary markers: None detected. Capability inventory: System command execution viasofficeand file system access via packing/unpacking. Sanitization: Useslxml.etree.parseindocx.pywhich may be vulnerable to XML External Entity (XXE) attacks if not explicitly hardened.
Audit Metadata