editing-pptx-files
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pyperforms runtime compilation of C code usinggccand utilizesLD_PRELOADto inject the library into thesofficeprocess. This is a powerful mechanism used to shim system-level calls for restricted environments. - [COMMAND_EXECUTION]: Multiple components, including
scripts/thumbnail.pyandscripts/office/validators/redlining.py, execute system binaries such assoffice,pdftoppm, andgitviasubprocess.runduring normal operation. - [PROMPT_INJECTION]: The skill ingests untrusted data from
.pptxfiles. Extracted content is provided to the agent and subagents without explicit boundary markers or instructions to ignore embedded commands, presenting a surface for indirect prompt injection (Category 8). - [DATA_EXFILTRATION]: In
scripts/office/validators/redlining.py, thexml.etree.ElementTreelibrary is used to parse XML from untrusted inputs without explicit protection against XML External Entity (XXE) attacks, which could lead to unauthorized file exposure.
Audit Metadata