PPT Generator Pro with Driving Effect
Audited by Socket on Mar 3, 2026
2 alerts found:
Securityx2This skill is a documentation/integration shim for a third-party CLI that provides real-money onchain operations (payments, payouts, links). The described capabilities are coherent with the stated purpose, but they introduce non-trivial supply-chain and autonomy risks: installing and running a global CLI from npm can execute arbitrary code; agent credentials (AGENT_TOKEN / AGENT_JWT) are required and will be sent to external API endpoints; and the agent is empowered to initiate fund transfers which could be abused if human confirmation is not enforced per critical action. There is no evidence of obfuscation or direct malicious code in the provided text itself, but the operational model (install third-party CLI, forward credentials, execute payments) warrants careful review of the actual CLI binary source and strict policies around human-in-the-loop confirmations. Recommended mitigation: verify the CLI source code, pin versions and supply cryptographic signatures, limit scope of tokens, and require explicit, per-transaction human approval before any payout or payment execution.
This skill's functional design (generate slides and optional transition videos) is plausible for its stated purpose. However, the integration model raises clear supply-chain and privacy risks: all generation requests and responses are routed through a monetization proxy (proxy-monetize.fluxapay.xyz) and the agent is expected to use the user's FluxA Agent Wallet to pay for calls (agent-pay). That combination centralizes sensitive document and prompt data to a third-party proxy and enables autonomous, agent-driven financial actions tied to the user's wallet. These behaviors are disproportionate to a simple PPT generator and create realistic opportunities for data exposure, unauthorized spend, and man-in-the-middle capture of prompts and generated assets. Recommended mitigations: require explicit per-operation user approval for any agent-pay transaction, allow users to provide and pin official vendor endpoints or their own API keys instead of routing through the proxy, log and surface billing actions before execution, and avoid automatic wallet delegation. Treat this skill as suspicious and require additional review and stricter user consent before use.