skills/davepoon/buildwithclaude/pptx/Gen Agent Trust Hub

pptx

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • COMMAND_EXECUTION (LOW): The script ooxml/scripts/pack.py executes the soffice command using subprocess.run to validate document integrity. Evidence: subprocess.run(["soffice", "--headless", ...], ...) in validate_document. This is part of the skill's primary functionality and does not use shell=True.
  • PROMPT_INJECTION (LOW): The skill processes untrusted external XML data within Office documents, creating a surface for indirect prompt injection. Ingestion points: ooxml/scripts/unpack.py and ooxml/scripts/pack.py. Boundary markers: Absent. Capability inventory: File system writes and subprocess execution. Sanitization: Employs defusedxml for XML parsing in many components, though some validation tasks use lxml.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:05 PM