pptx-generator
Warn
Audited by Gen Agent Trust Hub on May 7, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses a dynamic code generation and execution pattern. It instructs the agent to create JavaScript modules (e.g.,
slide-01.js) and then executes them vianode compile.jswhich dynamically imports these files usingrequire()with computed paths. This is a vector for executing logic that may be influenced by untrusted input during the generation phase. - [COMMAND_EXECUTION]: The workflow involves executing shell commands such as
node,python,npm, andpipfor installation, content extraction, and presentation compilation. - [EXTERNAL_DOWNLOADS]: The skill installs external software dependencies from public registries and utilizes the
PptxGenJSlibrary, which is documented to fetch image assets and backgrounds from remote URLs at runtime. - [PROMPT_INJECTION]: The skill processes user-provided
.pptxfiles using themarkitdowntool. This creates an indirect prompt injection surface where malicious instructions embedded in a source presentation could be extracted and subsequently influence the agent's behavior or the content of the generated slides. - Ingestion points: Extraction of text from external PowerPoint files via
markitdown(documented inSKILL.mdandreferences/editing.md). - Boundary markers: None provided to isolate extracted text from system instructions.
- Capability inventory: Execution of shell commands and dynamic JavaScript execution via
node. - Sanitization: The skill suggests using
defusedxmlinreferences/editing.mdfor XML processing to prevent XML-based attacks, but does not implement sanitization for natural language instructions.
Audit Metadata