ppt-render
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/chart-renderer.jsfile usesexecSyncwithshell: trueto execute the Mermaid CLI (mmdc). The command string is constructed using file paths that incorporate themeta.idfield directly from slide Markdown frontmatter without sanitization. This pattern allows for command injection if a malicious slide file with a specially crafted ID is processed. \n- [EXTERNAL_DOWNLOADS]: TheSKILL.mddocumentation specifies that users must install the@mermaid-js/mermaid-clipackage globally via NPM to enable chart rendering functionality. \n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it ingests and processes untrusted data from.slide.mdfiles that could contain malicious instructions for the agent. \n - Ingestion points:
scripts/slide-parser.jsreads and parses user-provided Markdown files. \n - Boundary markers: Absent. No delimiters or instructions are used to separate slide content from rendering logic. \n
- Capability inventory: The skill can execute system commands (
execSync) and write to the local file system. \n - Sanitization: Absent. Content and metadata like
meta.idare used directly in the processing pipeline without validation or escaping.
Audit Metadata