pptx
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill employs
subprocess.runto execute system commands for document conversion usinglibreofficeandpdftoppm. These executions are performed using argument lists, which mitigate shell injection risks.- [EXTERNAL_DOWNLOADS]: The skill references standard, well-known dependencies such aspython-pptxandPillow, as well as system packages likelibreofficeandpoppler-utils. These are appropriate for the skill's stated purpose and come from trusted ecosystems.- [DATA_EXFILTRATION]: The skill facilitates reading content from local files and writing extracted data (images, text) back to the local file system. No suspicious external network activity or exfiltration of sensitive system files was observed.- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as it reads and processes text from external PowerPoint files. While this could lead to the agent interpreting data as instructions, it is a standard behavior for document analysis tools. - Ingestion points: Python snippets in
SKILL.mdreading user-provided.pptxfiles. - Boundary markers: Not explicitly implemented in the provided code snippets.
- Capability inventory: Local file writing and system command execution via
subprocess.run. - Sanitization: No explicit sanitization of extracted text is shown in the examples.
Audit Metadata