docx
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes system tools to perform document operations.
ooxml/scripts/pack.pyexecutessofficefor file conversion and validation, andooxml/scripts/validation/redlining.pyusesgitfor diffing. - [REMOTE_CODE_EXECUTION]: The file
ooxml/scripts/unpack.pyuseszipfile.extractall()without path validation. This vulnerability, known as Zip Slip, allows a malicious archive to write files outside the target directory, potentially allowing an attacker to achieve code execution by overwriting configuration or startup scripts. - [EXTERNAL_DOWNLOADS]: The
SKILL.mdfile lists several third-party dependencies for the user to install, includingpandoc,libreoffice,poppler-utils, and thedocxnpm library. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It processes untrusted document content which can contain malicious instructions. The analysis chain is as follows: (1) Ingestion point:
ooxml/scripts/unpack.pyandpandoccommands; (2) Boundary markers: Absent; (3) Capabilities: Subprocess execution and file system writes; (4) Sanitization: Structural parsing viadefusedxmlis present, but no content filtering for natural language instructions. - [PROMPT_INJECTION]: Deceptive authorship information is present; the
LICENSE.txtfile identifies the owner as 'Anthropic, PBC', which contradicts the provided author name 'cat-xierluo'. - [SAFE]: The skill employs
defusedxmlfor XML parsing, providing protection against standard XML-based attacks like entity expansion.
Audit Metadata