pptx-manipulation
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill's primary function is to generate and execute Python code using the
python-pptxlibrary to automate PowerPoint tasks such as creating slides, adding text, and inserting charts. - [EXTERNAL_DOWNLOADS]: The documentation references the installation of the
python-pptxpackage from standard repositories, which is a well-known and trusted library for presentation processing. - [PROMPT_INJECTION]: The skill demonstrates an indirect prompt injection surface as it is designed to ingest and process data from external files, such as existing PowerPoint presentations or Markdown content.
- Ingestion points: Data enters the context through files processed by tools like
extract_from_pptxor when generating slides from user-provided Markdown. - Boundary markers: There are no explicit delimiters or specific instructions mentioned in the documentation to ignore or isolate instructions found within the ingested files.
- Capability inventory: The skill includes the ability to read/write files and execute dynamically generated Python code based on processed data.
- Sanitization: The documentation does not outline any sanitization or validation routines for the content extracted from external presentations.
Audit Metadata