docx
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill performs runtime compilation and process injection to modify application behavior.
- Script
scripts/office/soffice.pywrites C source code to a temporary directory and compiles it into a shared object (.so) file usinggcc. - The resulting library is injected into the LibreOffice (
soffice) process environment via theLD_PRELOADenvironment variable. - This mechanism intercepts and redirects low-level system socket calls (
socket,listen,accept,close) to facilitate document processing in restricted or sandboxed environments. - [COMMAND_EXECUTION]: The skill executes various system utilities to perform its primary tasks.
- Uses
subprocess.runto invokegccfor compilation,git difffor version comparison, andsofficefor document processing. - [EXTERNAL_DOWNLOADS]: The skill documentation requires the installation of external dependencies from public registries.
SKILL.mdinstructs the user to install thedocxlibrary globally vianpm install -g docx.
Audit Metadata