docx
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/office/soffice.pyimplements a dynamic execution pattern involving runtime compilation and process injection. - It contains embedded C source code for a socket shim designed to bypass environment-specific socket restrictions.
- It writes this source to a temporary file and executes
gccto compile it into a shared library (.so) at runtime. - It then uses the
LD_PRELOADenvironment variable to load this library into thesoffice(LibreOffice) process. While this behavior is documented as a workaround for sandboxing issues, runtime compilation and injection into other processes are high-risk patterns. - [COMMAND_EXECUTION]: Multiple Python scripts execute external shell commands via the
subprocessmodule to perform document processing tasks. scripts/office/soffice.pyexecutesgccandsoffice.scripts/accept_changes.pyexecutessofficeto clean tracked changes.scripts/office/validators/redlining.pyexecutesgit diffto perform word-level comparisons between documents.- [DATA_EXFILTRATION]: The skill processes untrusted document data, creating a vulnerability surface for data exposure and indirect instruction injection.
- Ingestion points: Untrusted data enters the context from Word documents via
scripts/office/unpack.pyand various document validators. - Boundary markers: The processing logic lacks explicit markers to differentiate between document content and agent instructions.
- Capability inventory: The skill has broad capabilities including file system access, subprocess execution, and runtime code generation.
- Sanitization: While some components utilize
defusedxml, several others likescripts/office/validators/redlining.pyandscripts/office/helpers/simplify_redlines.pyuse the standardxml.etree.ElementTreelibrary, which is vulnerable to XML External Entity (XXE) attacks. This could potentially allow a maliciously crafted document to read sensitive local files during the validation or simplification steps.
Audit Metadata