pptx
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The scripts
pack.pyandthumbnail.pyutilizesubprocess.runto execute external system tools likesofficeandpdftoppmfor document conversion tasks. Additionally, theunpack.pyscript uses the standardzipfilemodule'sextractallmethod without path validation, which is susceptible to ZipSlip directory traversal if a malicious PPTX file contains entries with..path segments. \n- [PROMPT_INJECTION]: The skill creates a surface for indirect prompt injection because it renders presentation content into HTML slides that are then processed by a browser engine via Playwright inhtml2pptx.js. Maliciously formatted text in a source document could potentially influence the AI agent or the rendering environment. \n - Ingestion points: User-provided
.pptxfiles parsed byinventory.pyandmarkitdown. \n - Boundary markers: No explicit delimiters or boundary instructions are used when the agent generates the HTML templates for rendering. \n
- Capability inventory: The skill can execute system commands via
subprocess.runand write to the local file system. \n - Sanitization: No automated content sanitization or escaping is provided in the provided library code.
Audit Metadata