pptx-reader
Fail
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/office/soffice.pydynamically writes C source code to a temporary file, compiles it into a shared library usinggcc, and then uses theLD_PRELOADenvironment variable to inject it into thesofficeprocess. This technique is used to intercept and shim socket system calls at runtime, representing a high-risk dynamic execution pattern. - [COMMAND_EXECUTION]: The skill makes extensive use of the
subprocessmodule to execute system binaries. It runsgccfor runtime compilation insoffice.py, and callssofficeandpdftoppmfor file conversion inthumbnail.pyandsoffice.py. - [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection as it processes untrusted user-provided
.pptxfiles. 1. Ingestion points:scripts/thumbnail.pyandscripts/office/unpack.py(reading .pptx files). 2. Boundary markers: Absent. 3. Capability inventory:subprocesscalls for compilation and system tools inscripts/office/soffice.pyandscripts/thumbnail.py. 4. Sanitization: Absent. Malicious instructions embedded in a presentation could influence the agent's behavior during analysis.
Recommendations
- AI detected serious security threats
Audit Metadata