pptx
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.run()to execute system utilities for document manipulation and comparison. \n sofficeis utilized inooxml/scripts/pack.pyandscripts/thumbnail.pyfor document validation and conversion tasks. \npdftoppmis used inscripts/thumbnail.pyto convert PDF slides into images. \ngit diffis used inooxml/scripts/validation/redlining.pyto perform word-level comparisons of document text content. \n- [PROMPT_INJECTION]: The skill ingests external data from presentation and HTML files, creating an indirect prompt injection surface where malicious instructions could be embedded in the content being processed. \nscripts/inventory.pyextracts slide text directly into the agent's context. \nscripts/html2pptx.jsrenders HTML templates using Playwright to extract layout and positioning data. \n- [SAFE]: The skill demonstrates secure coding practices by using thedefusedxmllibrary inunpack.pyandpack.pyto prevent XML-based attacks such as XML External Entity (XXE) exploitation.
Audit Metadata