powerpoint-presentations
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
pptxgenjs.mdreference documentation specifies that theaddImagefunction can fetch images from external remote URLs (e.g.,slide.addImage({ path: 'https://example.com/image.jpg', ... })). This is a standard feature for presentation software but involves outbound network requests to retrieve assets. - [COMMAND_EXECUTION]: The
create_presentationtool accepts acustom_codeparameter which executes arbitrary JavaScript within the scope of the PptxGenJS library. This dynamic code execution is the primary mechanism for generating complex slide layouts and visual elements. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes data from external sources.
- Ingestion points: The
analyze_presentationandupdate_slide_contenttools read text and structure from user-provided.pptxfiles. Additionally, theaddImagetool can fetch content from remote URLs. - Boundary markers: No specific delimiters or safety instructions are defined to separate untrusted text found in slides from the agent's instructions.
- Capability inventory: The skill possesses capabilities for reading/writing files and making network requests to fetch images.
- Sanitization: The instructions do not specify any sanitization or validation of the text content extracted from presentations before it is used in subsequent reasoning steps.
Audit Metadata