oracle-pptx
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Arbitrary command execution risk via unsanitized file path interpolation in shell commands.\n
- The JavaScript module
scripts/image-gen/validate-image.mjscontains thevalidateImageFilefunction, which supports an optionalcontentCheckshell hook.\n - This function performs a simple string replacement of
{path}with an image file path and executes the resulting string usingnode:child_processspawnSyncwithshell: true. This allows for command injection if an image path contains shell metacharacters such as backticks or semicolons.\n- [COMMAND_EXECUTION]: Insecure shell execution in the Python validation harness.\n - The Python script
scripts/validate/ensure_raster_image.pyimplements a matchingcontent_checkfeature that similarly usessubprocess.run(cmd, shell=True)to execute commands with interpolated paths.\n- [COMMAND_EXECUTION]: Execution of system binaries for document processing.\n - The skill programmatically invokes external system tools, including
soffice(LibreOffice) andpdftoppm(poppler-utils), to perform document conversion and rasterization.
Audit Metadata