sn-ppt-entry
Warn
Audited by Gen Agent Trust Hub on May 1, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted content from user-uploaded documents (PDF, DOCX, MD, TXT), creating a surface for indirect prompt injection. Maliciously crafted content within these documents could attempt to influence the LLM during the digest generation or affect downstream presentation stages.
- Ingestion points: User-uploaded files are parsed by
scripts/parse_user_docs.py, and the resulting text is passed to the LLM viaprompts/document_digest.md. - Boundary markers: The prompt in
prompts/document_digest.mdlacks explicit delimiters or instructions for the LLM to ignore embedded commands within the interpolated document text. - Capability inventory: The skill is capable of directory creation (
mkdir), file writing (task_pack.json,info_pack.json), executing Python scripts, and dispatching to other skills (sn-ppt-creative,sn-ppt-standard). - Sanitization: The parsing script performs text truncation to 20,000 characters but does not implement filtering or sanitization for prompt injection patterns.
- [COMMAND_EXECUTION]: The skill employs dynamic library loading and executes shell commands that rely on environment variables for path resolution.
- Evidence: In
SKILL.md, apython3 -ccommand dynamically modifiessys.pathusing the$PPT_STANDARD_DIRenvironment variable to import a local module. - Evidence: The
scripts/caption_images.pyscript similarly usessys.path.insertto load themodel_clientdependency from a path computed via the$PPT_STANDARD_DIRvariable. This pattern of dynamic loading from computed paths is a medium-risk behavior as it could lead to the execution of unintended code if environment variables point to untrusted locations.
Audit Metadata