ppt-agent

Fail

Audited by Socket on Mar 23, 2026

2 alerts found:

Obfuscated Filex2
Obfuscated FileHIGH
scripts/planning_validator.py

The codebase functions as a focused, static planning JSON validator with comprehensive checks and cross-page consistency rules. There is no evidence of malware, exfiltration, or backdoors. The primary concerns are input data validity, proper handling of refs_dir paths, and localization of messages. Overall, the security risk is moderate due to potential misconfiguration or unexpected input formats, but the module itself does not pose active threats.

Confidence: 92%
Obfuscated FileHIGH
scripts/resource_assembler.py

This script is a benign resource assembly utility and does not contain malware or obfuscated/backdoor code. However, it allows arbitrary local file reads via the fallback Path(rel_path) when a referenced resource is not present under refs_dir — enabling local information disclosure if planning JSON is untrusted. Fix by enforcing that all referenced files resolve inside refs_dir (use Path.resolve() and parent checks), disallow absolute/traversal paths, and harden output path handling to avoid accidental overwrites.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 23, 2026, 08:24 AM
Package URL
pkg:socket/skills-sh/sunbigfly%2Fppt-agent-skill%2Fppt-agent%2F@c4627c8334b786e26112f3137189e05257af2519