web-presentation
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWEXTERNAL_DOWNLOADS
Full Analysis
- [Category 4] EXTERNAL_DOWNLOADS (LOW): The skill utilizes Content Delivery Networks (CDNs) to fetch the Reveal.js library, Google Fonts, and styling assets at runtime.
- Evidence: README.md states the output is 'Self-contained HTML (CDN-based)'.
- [TRUST-SCOPE-RULE]: Loading from common CDNs like cdnjs or Google Fonts is standard practice for this type of tool and is categorized as LOW risk.
- [Category 8] INDIRECT_PROMPT_INJECTION (MEDIUM): The skill has a vulnerability surface where malicious instructions or scripts could be injected into the generated presentation if the source data is retrieved from an untrusted external entity.
- Ingestion points:
SLIDESarraycontentfield andPRESENTATIONmetadata object. - Boundary markers: Absent; the templates appear to trust the content provided to the
SLIDESobject. - Capability inventory: The skill generates HTML artifacts that are executed in the user's browser or within the AI interface's sandbox (e.g., Claude Artifacts), which could lead to Cross-Site Scripting (XSS).
- Sanitization: No explicit sanitization or escaping logic is documented in the layout or theme references, which show raw HTML strings being passed into the template.
- [Category 10] DYNAMIC_EXECUTION (LOW): The template-based approach involves assembling an executable HTML document from string fragments provided at runtime.
- Evidence:
reference/layouts.mdshows the use of raw HTML strings for slide structure and content.
Audit Metadata