ppt-agent
Audited by Socket on Mar 23, 2026
2 alerts found:
Obfuscated Filex2The codebase functions as a focused, static planning JSON validator with comprehensive checks and cross-page consistency rules. There is no evidence of malware, exfiltration, or backdoors. The primary concerns are input data validity, proper handling of refs_dir paths, and localization of messages. Overall, the security risk is moderate due to potential misconfiguration or unexpected input formats, but the module itself does not pose active threats.
This script is a benign resource assembly utility and does not contain malware or obfuscated/backdoor code. However, it allows arbitrary local file reads via the fallback Path(rel_path) when a referenced resource is not present under refs_dir — enabling local information disclosure if planning JSON is untrusted. Fix by enforcing that all referenced files resolve inside refs_dir (use Path.resolve() and parent checks), disallow absolute/traversal paths, and harden output path handling to avoid accidental overwrites.