Powerpoint / PPTX
v1.0.1Create, inspect, and edit Microsoft PowerPoint presentations and PPTX decks with reliable layouts, templates, placeholders, notes, charts, and visual QA. Use...
⭐ 102· 33.8k·342 current·358 all-time
byIván@ivangdavila
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name and description claim PowerPoint/PPTX editing and inspection; the SKILL.md contains detailed, domain-appropriate guidance about reading decks, inventorying templates/placeholders, layout mapping, and visual QA. There are no unrelated binaries, env vars, or installs requested.
Instruction Scope
The instructions are high-quality and focused on PPTX workflows (inspect before edit, inventory templates, preserve masters, run visual QA). They require the agent to read and inspect PPTX artifacts (expected), but are high-level and therefore leave implementation choices (how files are accessed or rendered) to the agent — review how your agent will open or render user files before use.
Install Mechanism
No install spec and no code files — instruction-only skill. This minimizes on-disk risk because nothing is downloaded or executed by the skill itself.
Credentials
The skill requests no environment variables, credentials, or config paths. That is proportionate for an instruction-only PPTX editing skill.
Persistence & Privilege
always is false and autonomous invocation is allowed by default (normal). The skill does not request persistent system presence or elevated privileges.
Assessment
This skill is an instruction-only guide for handling .pptx files and is internally consistent and low-risk: it does not install software or request secrets. Before installing, confirm how your agent will open or render PowerPoint files (uploading to a remote service or running local converters may have different privacy implications). If you plan to give the agent access to private decks, make sure the agent prompts before uploading files externally and that any file-handling/execution path is trusted. If you need stricter guarantees, prefer workflows that keep files local and review any concrete implementation code or connectors the agent will use to read or render slides.Like a lobster shell, security has layers — review code before you run it.
latestvk9790f8kmfj8gjsem4w7tffv7182q488
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
📊 Clawdis
OSLinux · macOS · Windows
