slides-full
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Uses standard shell utilities like
findandmkdirto manage project directories and locate configuration files such asdesign-profile.jsonwithin the local workspace. - [EXTERNAL_DOWNLOADS]: Executes the
agent-slidestool viauvx, which downloads the package from the Python Package Index (PyPI) at runtime. This package is the primary engine used for all extraction, build, and audit tasks described in the pipeline. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests and processes untrusted data from user-provided briefs and PowerPoint templates.
- Ingestion points: User-provided content descriptions, topics, outlines, and
.pptxtemplate files (specifically in theEXTRACTandBUILDsteps). - Boundary markers: None; the instructions do not specify the use of delimiters or instructions to ignore embedded commands within the external content.
- Capability inventory: The skill has the ability to execute shell commands via
uvx, perform file system operations (read/write), and generate executable operations (fixes_ops.json) to modify documents. - Sanitization: Employs several validation gates including
preflight,lint, andqato verify that the output meets technical contracts and visual standards, though these are not specifically designed to detect malicious instructions.
Audit Metadata