pptx-codex

Pass

Audited by Gen Agent Trust Hub on Mar 26, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes content from untrusted external PowerPoint files.
  • Ingestion points: The script scripts/extract_text.py reads slide text and speaker notes, while scripts/office/render.py renders slide content into images for visual QA. These processes pull data from the user-provided PPTX into the agent's context.
  • Boundary markers: No explicit delimiters or instructions (e.g., 'ignore embedded commands') are used when presenting extracted text or rendered images to the agent.
  • Capability inventory: The skill possesses significant capabilities that could be abused if an injection succeeds, including the ability to write files (scripts/office/pack.py), delete files within the project tree (scripts/clean.py), and execute shell commands via LibreOffice (scripts/office/soffice.py).
  • Sanitization: No validation or sanitization of the content extracted from presentation files is performed before it is processed by the agent.
  • [COMMAND_EXECUTION]: The skill performs legitimate but notable command execution using subprocess.run to manage office document workflows.
  • Subprocess calls: scripts/office/render.py invokes LibreOffice (soffice) in headless mode to convert presentations to PDF for rendering.
  • Argument passthrough: scripts/office/soffice.py acts as a wrapper that passes arbitrary command-line arguments directly to the system's soffice utility.
  • Internal orchestration: scripts/thumbnail.py and scripts/convert_to_images.py use subprocesses to coordinate execution between different Python scripts within the skill.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 26, 2026, 11:38 AM