pptx-processing-anthropic
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]:
- The script
scripts/office/soffice.pydynamically compiles an embedded C source string (_SHIM_SOURCE) usinggccinto a shared library at runtime to bypass environment-specific socket restrictions. - The skill uses
LD_PRELOADwithinscripts/office/soffice.pyto inject the dynamically compiled library into the execution environment of the LibreOffice (soffice) binary. - Several scripts (
scripts/thumbnail.py,scripts/office/validators/redlining.py) utilizesubprocess.run()to execute external binaries includingsoffice,pdftoppm, andgit. - [PROMPT_INJECTION]:
- The
SKILL.mdfile contains deceptive authorship metadata, claiming the author is 'Anthropic' while the provided context identifies the author as 'lawvable'. - [EXTERNAL_DOWNLOADS]:
- The skill documentation instructs the installation of external dependencies from public registries, including
markitdown[pptx],Pillow,pptxgenjs,react-icons, andsharp. - [SAFE]:
- The skill employs security best practices for XML handling by using the
defusedxmllibrary across its processing scripts to prevent XML External Entity (XXE) attacks.
Audit Metadata