html-to-ppt
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python integration example uses
subprocess.runto execute themarpcommand-line utility. This is the core functionality of the skill and is implemented safely using an argument list rather than a shell string. - [EXTERNAL_DOWNLOADS]: The documentation references
@marp-team/marp-clivia npm andmarp-clivia Homebrew. These are recognized as legitimate, well-known tools for generating presentations. - [PROMPT_INJECTION]: The skill processes user-supplied Markdown data which presents an indirect prompt injection surface. 1. Ingestion points:
md_contentparameter in themarkdown_to_pptxfunction. 2. Boundary markers: No explicit markers or delimiters are used to wrap the untrusted content. 3. Capability inventory: Usessubprocess.runto call external binaries. 4. Sanitization: No specific sanitization of the input Markdown is performed before it is passed to the conversion tool.
Audit Metadata