popai-powerpoint-pptx
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from external files and URLs.
- Ingestion points: The script
generate_ppt.pyaccepts user-supplied local files (PDF, PPTX, DOCX, images) via the--fileand--tplarguments. It also processes content from external web URLs included in the--querystring. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present when this external content is passed to the generation engine.
- Capability inventory: The skill is capable of reading local filesystem data and performing network requests to external API endpoints.
- Sanitization: There is no evidence of content sanitization or validation for the data ingested from external files or URLs before it is processed by the API.
- [COMMAND_EXECUTION]: The skill executes a local Python script (
generate_ppt.py) to orchestrate the presentation generation process, including file hashing, uploading to S3, and managing API communication. - [EXTERNAL_DOWNLOADS]: The skill directs the agent to provide download links for generated PPTX files hosted on the vendor's AWS S3 infrastructure (
popai-file-boe.s3-accelerate.amazonaws.com).
Audit Metadata