pptx
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Dynamic Execution (MEDIUM): The file
scripts/office/soffice.pyperforms runtime compilation of a C shim (lo_socket_shim.c) usinggccand applies it viaLD_PRELOAD. While this is intended to bypass socket restrictions in sandboxed environments for LibreOffice (soffice), runtime compilation and process injection are high-risk techniques. The severity is lowered to MEDIUM as it is central to the skill's primary purpose of slide rendering. - Unverifiable Dependencies (MEDIUM): The skill relies on several external binaries and packages including
LibreOffice,Poppler (pdftoppm),gcc, andpptxgenjs. While standard, the use ofgccto build and execute arbitrary C code at runtime increases the potential for exploitation if the compilation source were to be tampered with. - Indirect Prompt Injection (LOW): The skill is designed to ingest and process external PPTX files via
markitdownand custom XML parsing. This creates a significant surface for indirect prompt injection where malicious instructions embedded in slide content could influence the agent's behavior during analysis or visual QA loops. - Ingestion points:
scripts/office/unpack.pyandmarkitdown(viaSKILL.mdinstructions). - Boundary markers: Absent. The agent is encouraged to analyze the content directly.
- Capability inventory:
subprocess.run(executingsoffice,pdftoppm,gcc), file system write access viapathlib, and ZIP manipulation. - Sanitization: The skill correctly uses
defusedxmlto mitigate XML external entity (XXE) attacks. - Metadata Poisoning (LOW): The
descriptionfield inSKILL.mdcontains a confusing string (QUERY LENGTH LIMIT EXCEEDED...), which may be a remnant of a failed generation or a misleading indicator, though it does not pose a direct security threat.
Audit Metadata