oma-hwp
Pass
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill downloads the
kordocpackage from the npm registry usingbunxat runtime. - [REMOTE_CODE_EXECUTION]: The execution protocol recommends installing the Bun runtime using a shell script from its official domain (
bun.sh), which is executed directly in the terminal. - [REMOTE_CODE_EXECUTION]: The skill uses the
bunxcommand to fetch and execute thekordocutility from a remote package registry. - [COMMAND_EXECUTION]: The skill runs a local TypeScript script (
flatten-tables.ts) and thekordoccommand-line tool to perform document conversion and formatting. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted HWP, HWPX, and HWPML documents.
- Ingestion points: Reads document files from the local filesystem (
SKILL.md,execution-protocol.md). - Boundary markers: No delimiters or isolation instructions are present to separate document content from agent commands.
- Capability inventory: The skill can execute shell commands via
bunxandbun run, and performs file writes usingBun.write(flatten-tables.ts,execution-protocol.md). - Sanitization: While
kordocis reported to provide XSS and XXE defenses, there are no specific measures against indirect prompt injection.
Audit Metadata