pptx
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted content from PowerPoint and HTML files without explicit boundary markers or instructions to ignore embedded commands. Ingestion points: The agent ingests data from PPTX files via
scripts/inventory.pyand renders HTML slide templates viascripts/html2pptx.js. Boundary markers: There are no specific instructions or delimiters defined to isolate user-provided slide content from the agent's instructions. Capability inventory: The skill can execute system commands viasubprocess.run(soffice,pdftoppm) and has broad file system access. Sanitization: Althoughdefusedxmlis used for XML structure validation, the textual content extracted from slides and the HTML rendered in the browser are not sanitized for natural language instructions. - [COMMAND_EXECUTION]: The skill uses the system shell to execute several external document processing utilities. Evidence:
ooxml/scripts/pack.py,ooxml/scripts/redlining.py, andscripts/thumbnail.pyusesubprocess.runto callsoffice(LibreOffice),pdftoppm(Poppler), andgit. - [EXTERNAL_DOWNLOADS]: The skill depends on various external libraries and drivers. Evidence: Node.js dependencies include
playwright, which manages browser binaries for rendering, andsharp. Python dependencies includemarkitdownandpython-pptx.
Audit Metadata