pptx-to-md
Pass
Audited by Gen Agent Trust Hub on May 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. Malicious instructions embedded within processed PowerPoint slides (rendered as images) could influence the behavior of the agent or its subagents during the description phase.
- Ingestion points: Slide images (
.png) generated from user-supplied.pptx/.ppsxfiles inscripts/pptx_to_md.py. - Boundary markers: The system lacks explicit delimiters or instructions to ignore potential adversarial content within the slide images.
- Capability inventory: The agent utilizes
Read,Edit, andAgent(subagent spawning) tools to process and incorporate descriptions into the final Markdown file. - Sanitization: There is no sanitization or validation of the text generated by the vision capability before it is written to the filesystem.
- [COMMAND_EXECUTION]: The script
scripts/pptx_to_md.pyexecutes thesoffice(LibreOffice) command via thesubprocessmodule to perform file conversions. While implemented using a list of arguments (reducing shell injection risk), it relies on an external binary being present and correctly configured on the system. - [CREDENTIALS_UNSAFE]: The documentation in
SKILL.mdand the help text inscripts/pptx_to_md.pyencourage users to provide an Anthropic API key via a command-line flag (--api-key). This practice can expose sensitive credentials in shell history, process listings, and logs.
Audit Metadata