ppt-generator
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a local Python script located at
~/.claude/skills/ppt-generator/scripts/assemble_pptx.pyto compile generated slide images into a single PowerPoint file. This script uses thepython-pptxlibrary and is triggered by the agent as part of the standard document generation workflow.\n- [EXTERNAL_DOWNLOADS]: The system communicates with external image generation providers to create visual content for slides. Supported providers include well-known services such as Google, Volcengine (ByteDance), and ApiMart. Additionally, the configuration references a specific endpoint athttp://219.147.109.250:8198used as a local proxy for image generation services.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by incorporating untrusted user input directly into prompts sent to external image generation models.\n - Ingestion points: User-supplied slide titles, descriptions, and content in the
PresentationGenerator.generate_slidemethod.\n - Boundary markers: Absent in the provided prompt construction templates.\n
- Capability inventory: Includes file system write access for images/documents, network requests to third-party image APIs, and shell command execution for PPT assembly.\n
- Sanitization: No explicit sanitization or escaping of user-provided content is observed in the prompt interpolation logic.
Audit Metadata