Pptx Anthropic
PassAudited by VirusTotal on May 11, 2026.
Findings (1)
The skill bundle contains a script, scripts/office/soffice.py, that performs runtime compilation of a C-based shim using gcc and executes it via LD_PRELOAD to intercept system calls (socket, listen, accept). While this is plausibly intended to allow LibreOffice to function in restricted environments by shimming AF_UNIX sockets, the use of runtime compilation and library injection represents a high-risk capability. The rest of the bundle, including the instructions in SKILL.md and the Python scripts for PPTX manipulation (e.g., scripts/add_slide.py, scripts/office/unpack.py), appears well-structured and aligned with the stated purpose, incorporating security best practices such as the use of defusedxml to mitigate XXE risks.
