pptx-posters
Pass
Audited by Gen Agent Trust Hub on Apr 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute system commands like google-chrome and libreoffice for document conversion. These are well-known utilities used for the skill's core functionality.
- [EXTERNAL_DOWNLOADS]: The skill references the python-pptx library and vendor-provided scripts like scripts/generate_schematic.py to facilitate poster creation. These are standard dependencies for the tasks described.
- [INDIRECT_PROMPT_INJECTION]: The skill populates an HTML template with user-supplied research data without instructions for sanitization or escaping. This presents a vulnerability where malicious input could result in script execution (XSS) when the generated poster is viewed in a web browser.
- Ingestion points: User-provided research content (title, authors, body text) is written into the assets/poster_html_template.html file.
- Boundary markers: No delimiters or warnings to ignore embedded instructions are present in the templating process.
- Capability inventory: The skill possesses file writing capabilities and shell execution via Bash, including the ability to launch browsers.
- Sanitization: The instructions do not prescribe any form of input validation, escaping, or filtering for external content.
Audit Metadata