pptx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Dynamic Execution (HIGH): The skill performs runtime C compilation and process injection to bypass environment restrictions. Evidence: In
scripts/office/soffice.py, the_ensure_shimfunction writes a C source file (_SHIM_SOURCE) to the temporary directory, compiles it usinggcc -shared -fPIC, and injects the resulting shared object into thesofficeprocess using theLD_PRELOADenvironment variable. This technique of hooking system calls (socket, listen, accept) is a high-risk behavior associated with advanced evasion mechanisms.\n- Indirect Prompt Injection (HIGH): The skill is designed to ingest and process untrusted external content from .pptx files, creating a significant attack surface. Ingestion points: The skill usesmarkitdownto extract text from presentations andunpack.pyto parse XML content. Capability inventory: The skill has extensive system-level capabilities, including command execution (subprocess.run), file system modification (pack.py), and file deletion (clean.py). Boundary markers: There are no mechanisms to delimit untrusted content or warn the agent to ignore embedded instructions. Sanitization: No sanitization is performed on the extracted text before it is presented to the agent for reasoning.\n- Unverifiable Dependencies (MEDIUM): The skill requires several external packages and system binaries that must be installed on the host. Evidence:SKILL.mdspecifies requirements formarkitdown[pptx],pptxgenjs,soffice(LibreOffice), andpdftoppm(Poppler). The runtime generation and execution of thelo_socket_shim.sobinary is an unverifiable and high-risk dynamic dependency.
Recommendations
- AI detected serious security threats
Audit Metadata