codeck-export
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
pptx/scripts/office/soffice.pyperforms runtime C compilation and process injection. - Evidence: The script hardcodes a C source string, writes it to a temporary file in the system temp directory, compiles it using
gccinto a shared object library, and uses theLD_PRELOADenvironment variable to inject the library into thesofficeprocess. - [COMMAND_EXECUTION]: Several scripts execute system-level commands via
subprocess.runfor document processing and environment configuration. - Evidence: The skill executes
gccfor shared library compilation,sofficefor document conversion,pdftoppmfor image generation, andgitfor diffing activities. - [EXTERNAL_DOWNLOADS]: The skill automates the installation of browser binaries from remote registries.
- Evidence:
SKILL.mdcontains the commandnpx playwright install chromiumto fetch the browser required for PDF rendering. - [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection by processing untrusted user-supplied project files with tools that have browser and shell capabilities.
- Ingestion points: User project directory (HTML files).
- Boundary markers: Absent; instructions do not include warnings to disregard instructions embedded in the input files.
- Capability inventory: Shell command execution across multiple Python scripts and browser automation via Playwright.
- Sanitization: Absent; HTML content is passed directly to rendering engines.
Audit Metadata