pptx
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill extracts text content from external PowerPoint files, which creates a surface for indirect prompt injection where malicious instructions could be embedded in slides.\n
- Ingestion points: Slide content is read via
scripts/inventory.pyand themarkitdownpackage.\n - Boundary markers: No explicit boundary markers or warnings to ignore embedded commands are implemented during text extraction.\n
- Capability inventory: The skill has access to system utilities (
soffice,pdftoppm,git) and a headless browser (playwright) for slide rendering.\n - Sanitization: XML parsing is secured using
defusedxmlto prevent external entity injection (XXE) attacks.\n- [COMMAND_EXECUTION]: The skill invokes external command-line tools to support presentation processing and validation.\n - Evidence:
ooxml/scripts/pack.pyandscripts/thumbnail.pycallsoffice(LibreOffice) for PDF conversion and document validation.\n - Evidence:
scripts/thumbnail.pycallspdftoppmto generate slide thumbnail images.\n - Evidence:
ooxml/scripts/redlining.pyexecutesgit diffto compare and validate document revisions.
Audit Metadata