pptx
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pyperforms runtime code generation and process injection. It writes a hardcoded C source string to a temporary file, compiles it usinggccinto a shared library, and injects it into thesofficeprocess via theLD_PRELOADenvironment variable. This technique is used to shim system calls and bypass environment restrictions on UNIX sockets. Additionally, several scripts invoke external binaries such assofficefor document conversion,pdftoppmfor image rendering, andgitfor redlining comparisons viasubprocess.run. - [PROMPT_INJECTION]: The skill handles untrusted user-provided PowerPoint files, which presents a surface for indirect prompt injection via slide content processed by the agent. The skill uses the
defusedxmllibrary across several scripts (e.g.,scripts/office/unpack.py,scripts/clean.py) to mitigate common XML-based vulnerabilities like XXE.
Audit Metadata