pptx
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill frequently invokes local system binaries using the
subprocess.runmethod to perform its core tasks. Evidence includes the execution ofsoffice(LibreOffice) for converting presentations to PDF and images,pdftoppmfor slide image rendering, andgitfor comparing document changes in redlining validation workflows. - [REMOTE_CODE_EXECUTION]: The skill implements a dynamic execution pattern in
scripts/office/soffice.pywhere it writes an embedded C source string to a file, compiles it into a shared object library usinggcc, and then loads this library into thesofficeprocess environment via theLD_PRELOADenvironment variable. This mechanism facilitates runtime code generation and process injection. Although intended as a technical workaround for restricted environments, such capabilities provide a potential vector for unauthorized code execution if abused. - [EXTERNAL_DOWNLOADS]: Documentation and instructions within the skill (
SKILL.md,editing.md,pptxgenjs.md) direct the agent to install third-party dependencies from established package registries, specificallymarkitdownandPillowfrom PyPI, andpptxgenjs,react-icons, andsharpfrom NPM. - [PROMPT_INJECTION]: The skill is subject to an indirect prompt injection surface (Category 8) because it ingests complex XML data from user-provided presentation files and has access to powerful system capabilities.
- Ingestion points: Slide content processed via
markitdownand visual analysis of thumbnails (scripts/thumbnail.py). - Boundary markers: Absent; slide content is processed and analyzed without explicit delimiters or instructions to the agent to disregard natural language commands embedded in the data.
- Capability inventory: The skill can execute local shell commands and perform dynamic library compilation and injection.
- Sanitization: Absent for natural language content, though XML parsing is hardened using the
defusedxmllibrary to mitigate common XML-based attacks.
Audit Metadata