pptx-manipulation

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The skill's primary function is to generate and execute Python code using the python-pptx library to automate PowerPoint tasks such as creating slides, adding text, and inserting charts.
  • [EXTERNAL_DOWNLOADS]: The documentation references the installation of the python-pptx package from standard repositories, which is a well-known and trusted library for presentation processing.
  • [PROMPT_INJECTION]: The skill demonstrates an indirect prompt injection surface as it is designed to ingest and process data from external files, such as existing PowerPoint presentations or Markdown content.
  • Ingestion points: Data enters the context through files processed by tools like extract_from_pptx or when generating slides from user-provided Markdown.
  • Boundary markers: There are no explicit delimiters or specific instructions mentioned in the documentation to ignore or isolate instructions found within the ingested files.
  • Capability inventory: The skill includes the ability to read/write files and execute dynamically generated Python code based on processed data.
  • Sanitization: The documentation does not outline any sanitization or validation routines for the content extracted from external presentations.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 05:18 AM