PDF To PPTX

v1.0.0

Converts PDF documents into editable PowerPoint presentations with intelligent content extraction and formatting.

0· 180·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description match the behavior in SKILL.md and openapi.json (an API that accepts a PDF and returns a PPTX). No unexpected binaries, installs, or credentials are requested that would be unrelated to conversion.
Instruction Scope
The instructions explicitly direct uploading the user's PDF to an external API (https://api.mkkpro.com). This is coherent with the stated purpose but means user files are sent off-platform — a privacy/trust concern rather than an incoherence. The SKILL.md does not instruct reading other files, env vars, or system state.
Install Mechanism
No install spec or code files are included (instruction-only). This is low-risk because nothing will be written or executed on disk by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate to an HTTP-based conversion service.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges. It does not modify other skills or global agent settings.
Assessment
This skill appears to be what it claims (a wrapper for a conversion API) and doesn't request credentials or install code, but it will upload your PDF files to an external service (api.mkkpro.com). Before installing or using with sensitive documents: (1) verify the service owner and privacy/retention policy for file uploads, (2) test with non-sensitive sample files, (3) confirm uploads use HTTPS and check the endpoint domain is legitimate, and (4) consider an offline or self-hosted converter if you need to keep data local. The lack of a homepage or clear publisher reduces trust — treat uploads as potentially exposed unless you can verify the provider.

Like a lobster shell, security has layers — review code before you run it.

latestvk97c7v5mnj2rb18es4spnk3301839be2

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments