sophnet-pptx
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The render helper performs runtime compilation of a C shim and utilizes LD_PRELOAD to intercept system calls, facilitating LibreOffice execution in restrictive virtualized environments (scripts/office/soffice.py). \n- [COMMAND_EXECUTION]: The skill performs automated execution of various shell scripts and language-level subprocesses to manage virtual environments and manipulate Office documents (scripts/ensure_uv_env.sh, scripts/office/soffice.py, scripts/upload_file.sh). \n- [DATA_EXFILTRATION]: Automated transmission of generated PowerPoint files to an external service occurs to provide users with a download URL (scripts/upload_file.sh). \n- [EXTERNAL_DOWNLOADS]: Environment setup and management scripts utilize standard package managers to fetch and install required dependencies from official public registries (SKILL.md, scripts/ensure_uv_env.sh). \n- [COMMAND_EXECUTION]: An indirect prompt injection surface exists as the skill ingests untrusted PowerPoint files which are subsequently processed by tools with command execution and network capabilities. Ingestion point: markitdown text extraction (SKILL.md); Boundary markers: Absent; Capability inventory: Subprocess calls and network uploads; Sanitization: Absent.
Audit Metadata