pptx
Warn
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pyperforms runtime compilation and library injection. It dynamically writes a C source file (lo_socket_shim.c) to the temporary directory, compiles it into a shared object usinggcc, and then uses theLD_PRELOADenvironment variable to inject this library into thesoffice(LibreOffice) process. This is designed to bypass Unix socket restrictions in restricted execution environments.- [COMMAND_EXECUTION]: The skill executes various system utilities through thesubprocessmodule. Specifically,scripts/office/soffice.pyandscripts/thumbnail.pyinvokegcc,soffice, andpdftoppmto process presentation files and manage the socket shim.- [PROMPT_INJECTION]: The skill contains an indirect prompt injection surface documented inSKILL.mdandscripts/thumbnail.py. It processes untrusted.pptxfiles and transmits extracted text or rendered slide images to subagents for visual QA. The workflow lacks explicit boundary markers or content sanitization to prevent subagents from following malicious instructions embedded within the user-provided presentation data.
Audit Metadata