pptx
Warn
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Runtime compilation and process injection in
scripts/office/soffice.py. The script generates C code and compiles it at runtime usinggccto create a shared object. This object is then used viaLD_PRELOADto intercept and redirect socket-related system calls for thesofficeprocess, which is a high-risk pattern used to bypass environment restrictions.\n- [COMMAND_EXECUTION]: Use ofsubprocess.runto execute system binaries. The skill executessoffice,pdftoppm, andgitto handle file conversion, visual processing, and document comparison tasks.\n- [PROMPT_INJECTION]: Vulnerability surface for indirect prompt injection via processed PowerPoint files. Ingestion points: Untrusted.pptxfiles are parsed usingmarkitdownas recommended in the editing workflow. Boundary markers: None; extracted text is not enclosed in delimiters or accompanied by instructions to ignore embedded commands. Capability inventory: Includes runtime compilation, process injection, extensive file system write access, and potential network requests. Sanitization: None; external content is processed without escaping or validation before being presented to the agent.\n- [EXTERNAL_DOWNLOADS]: Fetching of external assets and installation of dependencies.SKILL.mdrequires installing packages fromnpmandpipregistries. Thepptxgenjsmodule documentation also specifies capabilities to download images from arbitrary external URLs during the slide creation process.
Audit Metadata