pptx
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
ooxml/scripts/unpack.pyscript useszipfile.ZipFile.extractall()without path validation or security filters, which introduces a potential directory traversal (ZipSlip) risk if processing a maliciously crafted PowerPoint archive. - [PROMPT_INJECTION]: The skill extracts and processes text from untrusted PowerPoint files, creating an indirect prompt injection surface.
- Ingestion points: Text extraction in
scripts/inventory.pyand markdown conversion viamarkitdownmentioned inSKILL.md. - Boundary markers: Absent. There are no instructions or delimiters designed to isolate extracted content or warn the agent to ignore instructions embedded in the presentations.
- Capability inventory: The skill has access to shell command execution via
subprocess.run(inooxml/scripts/pack.pyandscripts/thumbnail.py) and a headless browser environment via Playwright (inscripts/html2pptx.js). - Sanitization: Absent. Presentation content is extracted and processed as raw text without filtering.
- [COMMAND_EXECUTION]: The skill executes several external system binaries via
subprocess.runto perform core tasks. ooxml/scripts/pack.pyandscripts/thumbnail.pycallsoffice(LibreOffice) for format conversion.scripts/thumbnail.pycallspdftoppm(Poppler-utils) for slide imaging.ooxml/scripts/validation/redlining.pycallsgitto generate diffs between document versions.- [EXTERNAL_DOWNLOADS]: The skill references and requires several third-party libraries from official package registries (PyPI and NPM) for document processing, rendering, and image management.
- Python:
markitdown,defusedxml,python-pptx,Pillow,lxml, andsix. - Node.js:
pptxgenjs,playwright,react-icons,react,react-dom, andsharp.
Audit Metadata