docx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): Path Traversal (ZipSlip) vulnerability detected in
ooxml/scripts/unpack.py. - Evidence: The script uses
zipfile.ZipFile(input_file).extractall(output_path)without verifying that the file paths inside the ZIP archive are confined to theoutput_path. A malicious Office document could contain filenames like../../etc/shadowor../../scripts/malicious.pyto overwrite arbitrary files on the system. - [COMMAND_EXECUTION] (MEDIUM): Subprocess execution of
soffice(LibreOffice) inooxml/scripts/pack.py. - Evidence: The
validate_documentfunction usessubprocess.runto callsoffice --headless --convert-to html .... Executing a full office suite on potentially malicious, attacker-controlled OOXML files is risky due to the history of document-parsing vulnerabilities in LibreOffice. - [INDIRECT_PROMPT_INJECTION] (HIGH): High capability surface when processing untrusted external data.
- Ingestion points:
ooxml/scripts/unpack.py(viazipfile) andooxml/scripts/validation/docx.py(vialxml.etree). - Boundary markers: None detected. The skill processes the raw XML structure of external documents without any sanitization of the logical content.
- Capability inventory: File system write access via
zipfile.extractallandPath.write_bytes; external process execution viasubprocess.run(soffice). - Sanitization: While
defusedxmlis used in some files to mitigate XXE, it does not protect against the identified ZipSlip vulnerability or logical manipulation of the document structure that could trigger downstream agent misbehavior. - [CATEGORY 10: DYNAMIC EXECUTION] (LOW): Use of
lxmlfor XML parsing inooxml/scripts/validation/docx.py. - Evidence:
lxml.etree.parse()is used to process the extracted document files.lxmlis not secure against all XML-based attacks by default; althoughdefusedxmlis used elsewhere in the skill, its absence in the validation logic is a consistency risk.
Recommendations
- AI detected serious security threats
Audit Metadata