powerpoint-slides
Audited by Socket on Mar 29, 2026
2 alerts found:
Securityx2No direct evidence of Python-level malware/backdoor or network exfiltration in this fragment. However, it compiles LaTeX content from an input JSON directly with xelatex and then runs PDF/SVG conversion tools without sandboxing; this is a well-known high-impact trust boundary and could enable malicious behavior if the formulas are attacker-controlled (e.g., TeX macro abuse, file read/write, or command execution depending on template/options). Treat as security-critical if inputs are not fully trusted; harden by disabling dangerous TeX features and sandboxing the renderer.
No obvious hardcoded backdoor/credential theft/exfiltration is present in this module. However, it executes external tools (especially `xelatex`) using untrusted per-diagram input (`entry['code']`) with no sandboxing or TeX restriction flags shown. This creates a high security risk of RCE or environment/file access through TeX/renderer capabilities and also allows attacker-influenced selection of the Graphviz executable via `entry['engine']`.