pptx
Fail
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- Dynamic Execution (HIGH): The script
scripts/office/soffice.pygenerates C source code at runtime, compiles it usinggcc, and injects the resulting shared library into thesoffice(LibreOffice) process using theLD_PRELOADenvironment variable. This allows for low-level process manipulation and arbitrary code execution.\n- Command Execution (MEDIUM): Multiple scripts utilize thesubprocessmodule to execute external binaries includinggcc,soffice,pdftoppm, andgit. While these are used for document processing and validation, they increase the attack surface if external inputs are not strictly validated.\n- Indirect Prompt Injection (LOW): The skill is designed to ingest and process untrusted PPTX files, which could contain malicious instructions meant to influence the agent's behavior during analysis or visual inspection.\n - Ingestion points: External
.pptxfiles processed byscripts/office/unpack.py.\n - Boundary markers: No explicit delimiters or instructions to ignore embedded content were found in the processing scripts.\n
- Capability inventory: The skill has the ability to write to the filesystem, execute system commands (
subprocess.run), and compile/inject code.\n - Sanitization: The skill correctly uses
defusedxmlto mitigate XML-based attacks (XXE) in most processing files, though standardxml.etree.ElementTreeis used in some validation scripts.
Recommendations
- AI detected serious security threats
Audit Metadata