pptx
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DYNAMIC_EXECUTION]: The module
scripts/office/soffice.pyperforms runtime compilation and library injection. It writes a C source string to a temporary file, compiles it into a shared object usinggcc, and then uses theLD_PRELOADenvironment variable to load the shim when executing LibreOffice. This is designed to redirectAF_UNIXsocket calls tosocketpairto bypass environment restrictions. - [COMMAND_EXECUTION]: The skill relies heavily on executing external binary tools via subprocess, including
gccfor compilation,sofficefor PDF conversion, andpdftoppmfor image generation. - [EXTERNAL_DOWNLOADS]: The skill instructions and documentation specify dependencies on several external packages from public registries, including
markitdown,pptxgenjs,react-icons, andsharp. - [INDIRECT_PROMPT_INJECTION]: The skill extracts and processes text from untrusted
.pptxinput files. While it usesdefusedxmlto prevent XML-based attacks (like XXE), the extracted content enters the agent's context and could contain malicious instructions designed to override agent behavior. - [SAFE]: The skill correctly uses
defusedxmlfor XML parsing tasks, which is a security best practice for handling potentially malicious Office document structures.
Audit Metadata