pptx

Warn

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script scripts/office/soffice.py performs runtime code generation and process injection. It writes a hardcoded C source string to a temporary file, compiles it using gcc into a shared library, and injects it into the soffice process via the LD_PRELOAD environment variable. This technique is used to shim system calls and bypass environment restrictions on UNIX sockets. Additionally, several scripts invoke external binaries such as soffice for document conversion, pdftoppm for image rendering, and git for redlining comparisons via subprocess.run.
  • [PROMPT_INJECTION]: The skill handles untrusted user-provided PowerPoint files, which presents a surface for indirect prompt injection via slide content processed by the agent. The skill uses the defusedxml library across several scripts (e.g., scripts/office/unpack.py, scripts/clean.py) to mitigate common XML-based vulnerabilities like XXE.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 1, 2026, 05:09 PM