pptx
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/office/soffice.pyimplements a compatibility workaround by writing C source code to a temporary file and compiling it at runtime usinggcc. The resulting shared library is then injected into thesofficeprocess using theLD_PRELOADenvironment variable. While this is used to bypass environment-specific socket restrictions for LibreOffice, it is a high-privilege technique for dynamic code execution. - [COMMAND_EXECUTION]: Multiple scripts, including
scripts/thumbnail.py,scripts/office/soffice.py, andscripts/office/validators/redlining.py, utilize thesubprocess.runfunction to execute system commands such assoffice,pdftoppm,git, andgcc. These operations are essential for the skill's primary functions of document conversion, visual preview generation, and change tracking. - [PROMPT_INJECTION]: The skill ingests external data from
.pptxfiles during the unpacking and analysis phases (e.g., inscripts/office/unpack.py). This creates a vulnerability to indirect prompt injection, as text extracted from malicious presentations could contain instructions designed to influence the agent's behavior. The current instructions do not explicitly mandate the use of boundary markers or instructions to ignore embedded commands when processing extracted content.
Audit Metadata