pptx-creator
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection through its image generation feature.
- Ingestion points: The
scripts/create_pptx.pyscript parses user-provided Markdown outlines and JSON structures to identify image generation prompts (e.g.,generate: description). - Boundary markers: There are no explicit boundary markers or instructions implemented to prevent malicious instructions embedded in the input data from being interpreted by the downstream image generation tool.
- Capability inventory: The skill possesses the capability to execute shell commands via
subprocess.runinscripts/create_pptx.pyto call an external image generation script located in a sibling skill directory. - Sanitization: The input prompts are extracted and passed directly to the subprocess call without significant validation or escaping, relying on the receiving script's own security measures.
- [COMMAND_EXECUTION]: The script
scripts/create_pptx.pyutilizessubprocess.runto execute external scripts viauv run. While the use of an argument list prevents direct shell injection, the execution of external logic triggered by content from untrusted input files represents a sensitive capability.
Audit Metadata