pptx
Warn
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pyimplements a runtime compilation pattern where C source code is written to a temporary file and compiled into a shared library usinggcc. This library is then injected into the LibreOffice (soffice) process via theLD_PRELOADenvironment variable. This is a powerful and high-risk technique for manipulating process behavior at runtime. - [COMMAND_EXECUTION]: Several scripts (
soffice.py,thumbnail.py,redlining.py) utilize thesubprocessmodule to execute system binaries, includinggcc,soffice,pdftoppm, andgit. Executing external tools based on parameters derived from document processing is an inherently risky pattern if inputs are not strictly controlled. - [COMMAND_EXECUTION]: The
fix_pptx.pyscript logic described inpptxgenjs.mduseszipfile.extractall()on temporary directories. This operation is vulnerable to path traversal attacks (ZipSlip) if the script is executed on a malicious PowerPoint file containing filenames with../segments, potentially allowing files to be written outside the intended extraction path. - [PROMPT_INJECTION]: The skill exhibits a significant attack surface for indirect prompt injection. It processes untrusted documents provided by users and extracts content using tools like
markitdown. - Ingestion points: Untrusted data enters the agent context via
scripts/office/unpack.pyand text extraction tools. - Boundary markers: Instructions in
SKILL.mdand documentation lack delimiters or explicit warnings to ignore instructions embedded within the extracted document content when processing it with subagents. - Capability inventory: The skill has broad capabilities, including system command execution, file system modification, and runtime code compilation, which could be abused if an injection is successful.
- Sanitization: While the scripts handle XML structural repairs, they do not include logic to sanitize or filter natural language instructions extracted from document text runs.
Audit Metadata