pdf-to-ppt-pack
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script 'PPTX/scripts/office/soffice.py' dynamically generates C source code, compiles it into a shared library using 'gcc', and injects it into the LibreOffice ('soffice') process through the 'LD_PRELOAD' environment variable. This mechanism intercepts low-level socket system calls to enable execution in environments where UNIX domain sockets are restricted.
- [COMMAND_EXECUTION]: Multiple scripts utilize 'subprocess.run' to execute external binaries, including 'soffice' for document conversion, 'pdftoppm' for image extraction, and 'git' for version comparison.
- [EXTERNAL_DOWNLOADS]: The presentation framework includes functionality to download images from remote URLs using the 'requests' and 'urllib' libraries, as seen in the slide rendering logic and example configurations.
Audit Metadata