pptx
Warn
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
subprocessmodule to execute external system tools. This includes calls tosoffice(LibreOffice) for document conversion,pdftoppmfor slide imaging, andgitfor generating document diffs inscripts/office/validators/redlining.py. Most significantly,scripts/office/soffice.pydynamically writes C source code to a temporary file and invokesgccat runtime to compile a shared object library used for socket interception viaLD_PRELOAD. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection (Category 8) because it ingests untrusted data from external PowerPoint files.
- Ingestion points: Files are unpacked and their XML content is read into the agent context in
scripts/office/unpack.pyandSKILL.md. - Boundary markers: Absent; the skill does not use specific delimiters or instructions to the agent to ignore potentially malicious text within slide content.
- Capability inventory: The skill has high privileges, including the ability to compile code (
gcc), execute system binaries (soffice,git), and write files to the system. - Sanitization: While
defusedxmlis used to prevent XML-level exploits (XXE), there is no sanitization of the natural language content extracted from slides before it is processed by the AI. - [SAFE]: The skill demonstrates security awareness by using the
defusedxmllibrary for parsing Office XML files instead of the standardxml.etree, which effectively mitigates XML External Entity (XXE) vulnerabilities when handling files provided by users.
Audit Metadata