popai-powerpoint-pptx

Pass

Audited by Gen Agent Trust Hub on Mar 30, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data from external files and URLs.
  • Ingestion points: The script generate_ppt.py accepts user-supplied local files (PDF, PPTX, DOCX, images) via the --file and --tpl arguments. It also processes content from external web URLs included in the --query string.
  • Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present when this external content is passed to the generation engine.
  • Capability inventory: The skill is capable of reading local filesystem data and performing network requests to external API endpoints.
  • Sanitization: There is no evidence of content sanitization or validation for the data ingested from external files or URLs before it is processed by the API.
  • [COMMAND_EXECUTION]: The skill executes a local Python script (generate_ppt.py) to orchestrate the presentation generation process, including file hashing, uploading to S3, and managing API communication.
  • [EXTERNAL_DOWNLOADS]: The skill directs the agent to provide download links for generated PPTX files hosted on the vendor's AWS S3 infrastructure (popai-file-boe.s3-accelerate.amazonaws.com).
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 30, 2026, 03:39 AM