powerpoint-toolkit
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/thumbnails.pyfile executes external system utilitiessofficeandpdftoppmviasubprocess.runto generate visual previews of slides. - [COMMAND_EXECUTION]: The
scripts/setup_deps.pyscript manages environment setup by installing well-known dependencies includingpython-pptx,Pillow, andpyyaml. - [EXTERNAL_DOWNLOADS]: Documentation in
references/design-and-creation.mdincludes code snippets that demonstrate downloading remote images usingurllib.request.urlretrieve. - [PROMPT_INJECTION]: Indirect prompt injection vulnerabilities exist because the skill extracts and interprets text from external PowerPoint files which may contain adversarial instructions.
- Ingestion points:
scripts/extract_text.py,scripts/inspect_pptx.py, andscripts/analyze_pptx.pyingest slide text, tables, and speaker notes. - Boundary markers: None; the skill does not use delimiters or provide instructions to the agent to ignore content within the extracted data.
- Capability inventory: File system modification, execution of system binaries, and network access (via examples).
- Sanitization: No sanitization or filtering of the extracted slide content is performed.
Audit Metadata