pptx

Warn

Audited by Gen Agent Trust Hub on Mar 3, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses scripts/office/soffice.py to compile an embedded C source string at runtime using gcc. The resulting shared library is used with LD_PRELOAD to inject into the soffice process, subverting environment-level restrictions on AF_UNIX sockets.
  • [EXTERNAL_DOWNLOADS]: Generation workflows defined in pptxgenjs.md support downloading image assets from arbitrary remote URLs.
  • [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface (Category 8). 1. Ingestion point: scripts/office/unpack.py parses user-provided .pptx files. 2. Boundary markers: Absent. 3. Capability inventory: The skill performs high-risk subprocess calls across several files including scripts/office/soffice.py (gcc) and scripts/thumbnail.py (pdftoppm). 4. Sanitization: There is no sanitization or escaping of extracted slide text, though defusedxml is correctly used for XML processing.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 3, 2026, 12:24 PM