pptx-generator
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill possesses a significant attack surface by processing external data (templates and replacement JSON) with high-privilege capabilities.
- Ingestion points: Processes
template.pptxandreplacements.jsonvia Deno scripts. - Boundary markers: No boundary markers or 'ignore' instructions are defined for the processed content.
- Capability inventory: Uses
deno runwith--allow-readand--allow-writeflags, granting the skill ability to read and modify any file the user has access to. - Sanitization: The provided JSON schema and documentation do not show evidence of path sanitization or restriction to a specific workspace, allowing potential path traversal attacks.
- Data Exposure & Exfiltration (HIGH): The
ImageOptionsandPresentationSpecschemas allow for apathproperty to be specified for images and templates. - Evidence: In
assets/slide-spec-schema.json, thepathproperty for images is a raw string. Inreferences/template-workflow.md, the workflow encourages passing arbitrary file paths to Deno scripts. - Risk: An attacker could provide paths to sensitive local files (e.g.,
~/.ssh/id_rsaor/etc/passwd) to be read by the script and potentially embedded into a generated presentation or exfiltrated if the script logic allows. - Command Execution (MEDIUM): The documentation in
references/template-workflow.mdexplicitly provides shell commands for the agent to execute. - Evidence: Multiple instances of
deno run --allow-read --allow-write scripts/...are provided as standard workflow steps. - Risk: While these are intended for the skill's functionality, they provide a template for local command execution that could be exploited if the agent is tricked into modifying the arguments (e.g., adding
--allow-netor changing the script path).
Recommendations
- AI detected serious security threats
Audit Metadata