pptx
Fail
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Runtime compilation and shared library injection.\n
- The script
scripts/office/soffice.pycontains a hardcoded C source string that is written to a temporary file and compiled at runtime usinggcc.\n - The resulting shared object library (
lo_socket_shim.so) is then injected into the execution context of LibreOffice via theLD_PRELOADenvironment variable. This represents a high-risk execution pattern capable of intercepting and modifying system calls.\n- [COMMAND_EXECUTION]: Arbitrary subprocess execution for utility functions.\n - The skill frequently invokes external binaries including
soffice,pdftoppm,gcc, andgitthroughsubprocess.runcalls.\n - In
scripts/office/validators/redlining.py, the skill callsgit diffto compare text content extracted from different versions of Word documents, exposing the environment to command-line risks if paths are not properly sanitized.\n- [PROMPT_INJECTION]: Vulnerability surface for indirect prompt injection.\n - Ingestion points: Untrusted data enters the agent context through text extraction from slides via
markitdownand visual analysis of rendered thumbnails and slide images.\n - Boundary markers: The instructions provided to the agent and subagents fail to define clear delimiters or 'ignore' instructions for content parsed from user-provided files.\n
- Capability inventory: The skill possesses powerful capabilities such as arbitrary command execution and file system modification (e.g.,
scripts/clean.pyunlinks files andscripts/add_slide.pywrites XML content).\n - Sanitization: There is no evidence of sanitization or escaping of extracted slide text before it is interpolated into agent prompts.
Recommendations
- AI detected serious security threats
Audit Metadata