pptx-posters

Pass

Audited by Gen Agent Trust Hub on Apr 21, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses the Bash tool to execute system commands like google-chrome and libreoffice for document conversion. These are well-known utilities used for the skill's core functionality.
  • [EXTERNAL_DOWNLOADS]: The skill references the python-pptx library and vendor-provided scripts like scripts/generate_schematic.py to facilitate poster creation. These are standard dependencies for the tasks described.
  • [INDIRECT_PROMPT_INJECTION]: The skill populates an HTML template with user-supplied research data without instructions for sanitization or escaping. This presents a vulnerability where malicious input could result in script execution (XSS) when the generated poster is viewed in a web browser.
  • Ingestion points: User-provided research content (title, authors, body text) is written into the assets/poster_html_template.html file.
  • Boundary markers: No delimiters or warnings to ignore embedded instructions are present in the templating process.
  • Capability inventory: The skill possesses file writing capabilities and shell execution via Bash, including the ability to launch browsers.
  • Sanitization: The instructions do not prescribe any form of input validation, escaping, or filtering for external content.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 21, 2026, 08:17 AM