ppt-generator

Pass

Audited by Gen Agent Trust Hub on Apr 16, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill executes a local Python script located at ~/.claude/skills/ppt-generator/scripts/assemble_pptx.py to compile generated slide images into a single PowerPoint file. This script uses the python-pptx library and is triggered by the agent as part of the standard document generation workflow.\n- [EXTERNAL_DOWNLOADS]: The system communicates with external image generation providers to create visual content for slides. Supported providers include well-known services such as Google, Volcengine (ByteDance), and ApiMart. Additionally, the configuration references a specific endpoint at http://219.147.109.250:8198 used as a local proxy for image generation services.\n- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by incorporating untrusted user input directly into prompts sent to external image generation models.\n
  • Ingestion points: User-supplied slide titles, descriptions, and content in the PresentationGenerator.generate_slide method.\n
  • Boundary markers: Absent in the provided prompt construction templates.\n
  • Capability inventory: Includes file system write access for images/documents, network requests to third-party image APIs, and shell command execution for PPT assembly.\n
  • Sanitization: No explicit sanitization or escaping of user-provided content is observed in the prompt interpolation logic.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 16, 2026, 09:19 PM