pdf-to-ppt-pack

Warn

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [COMMAND_EXECUTION]: The script 'PPTX/scripts/office/soffice.py' dynamically generates C source code, compiles it into a shared library using 'gcc', and injects it into the LibreOffice ('soffice') process through the 'LD_PRELOAD' environment variable. This mechanism intercepts low-level socket system calls to enable execution in environments where UNIX domain sockets are restricted.
  • [COMMAND_EXECUTION]: Multiple scripts utilize 'subprocess.run' to execute external binaries, including 'soffice' for document conversion, 'pdftoppm' for image extraction, and 'git' for version comparison.
  • [EXTERNAL_DOWNLOADS]: The presentation framework includes functionality to download images from remote URLs using the 'requests' and 'urllib' libraries, as seen in the slide rendering logic and example configurations.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 9, 2026, 01:09 AM