revealjs

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (LOW): The scripts/edit-html.js file uses child_process.exec to automatically open the default web browser. While the command is constructed from known platform strings, it is an unnecessary privilege.
  • EXTERNAL_DOWNLOADS (MEDIUM): The skill utilizes puppeteer, which downloads a full browser binary upon installation. Furthermore, the scripts/create-presentation.js script generates HTML templates that include multiple external dependencies (Reveal.js, Font Awesome, Chart.js) via public CDNs.
  • REMOTE_CODE_EXECUTION (MEDIUM): The scripts/edit-html.js script launches a local HTTP server that accepts POST requests to /save and writes the body directly to the targeted HTML file. Due to the absence of CSRF protection and authentication, a malicious website could overwrite the local presentation file if the editor is active.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 05:48 PM