Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

PPT Reader

v1.0.0

Use when user sends a PPT/PPTX file or asks to read PowerPoint content. 适用于:读取PPT文件、解析演示文稿内容、提取幻灯片文本。

1· 179·1 current·1 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for jingqiu2180/ppt-reader.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "PPT Reader" (jingqiu2180/ppt-reader) from ClawHub.
Skill page: https://clawhub.ai/jingqiu2180/ppt-reader
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install ppt-reader

ClawHub CLI

Package manager switcher

npx clawhub@latest install ppt-reader
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name and description (reading PPT/PPTX content) align with the provided commands and workflow: unzip + sed/grep/tr to extract slide XML text. No unrelated services, credentials, or binaries are requested.
Instruction Scope
Instructions explicitly instruct reading files from /root/.openclaw/media/inbound/ and running shell commands (unzip, sed, grep, tr). This is coherent for processing uploaded PPTX files, but it does assume the agent can read that system path and will operate on any file placed there.
Install Mechanism
Instruction-only skill with no install spec and no code files. No packages or remote downloads are required, lowering risk.
Credentials
No environment variables, credentials, or external config paths are requested beyond the single inbound path used to find uploaded files—proportionate to the task.
Persistence & Privilege
Skill is not always-enabled and uses default autonomous invocation. It does not request persistent system changes or modify other skills' configurations.
Assessment
This skill is coherent for extracting text from .pptx files and doesn't ask for secrets or external installs. Before enabling, confirm you are comfortable with the agent reading files from /root/.openclaw/media/inbound/ (it will process any PPTX placed there). Ensure only intended/uploaded PPTX files are stored in that directory, and verify the host has standard utilities (unzip, sed, grep, tr). If you want stricter control, avoid allowing autonomous runs or require manual invocation when processing sensitive documents.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b02zvv2se9pspc79rzn0my983jgsv
179downloads
1stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

PPT Reader

Overview

读取和解析 PowerPoint 文件(.pptx),提取幻灯片文本内容。

When to Use

  • 用户发送了 .pptx 文件
  • 需要提取PPT中的文字内容
  • 需要了解PPT的结构和页数

Quick Reference

操作命令
查看PPT页数unzip -l file.pptx | grep "slide[0-9]*\.xml" | wc -l
提取所有文本unzip -p file.pptx "ppt/slides/slide*.xml" | sed 's/<[^>]*>//g'
逐页提取见下方脚本

Implementation

方法1:快速提取所有文本

unzip -p "file.pptx" "ppt/slides/slide*.xml" 2>/dev/null | sed 's/<[^>]*>//g' | tr -s ' \n'

方法2:逐页提取(推荐)

cd /path/to/ppt/
for i in {1..N}; do 
  echo "=== Slide $i ===" 
  unzip -p "file.pptx" "ppt/slides/slide$i.xml" 2>/dev/null | sed 's/<[^>]*>//g' | tr -s ' \n'
  echo ""
done

方法3:获取PPT基本信息

# 页数
unzip -l "file.pptx" | grep -c "slide[0-9]*\.xml"

# 文件结构
unzip -l "file.pptx" | grep -E "slide[0-9]+\.xml"

Workflow

  1. 确认文件路径 - 从 /root/.openclaw/media/inbound/ 获取文件
  2. 获取页数 - 确定有多少张幻灯片
  3. 逐页提取 - 循环提取每页内容
  4. 整理输出 - 汇总成结构化摘要

Common Patterns

处理飞书发送的PPT

飞书发送的文件通常保存在:

/root/.openclaw/media/inbound/

文件名格式:

原始文件名-uuid.pptx

提取特定幻灯片

# 只提取第1页
unzip -p "file.pptx" "ppt/slides/slide1.xml" | sed 's/<[^>]*>//g'

# 提取第1-5页
for i in {1..5}; do unzip -p "file.pptx" "ppt/slides/slide$i.xml" | sed 's/<[^>]*>//g'; done

Limitations

  • 只能提取文本内容,无法提取图片、图表
  • 无法获取格式信息(字体、颜色、布局)
  • 复杂表格可能提取不完整
  • 仅支持 .pptx 格式(不支持旧版 .ppt)

Real-World Example

# 完整提取流程
PPT_FILE="/root/.openclaw/media/inbound/智能体-概述-20260116-xxx.pptx"

# 1. 获取页数
PAGE_COUNT=$(unzip -l "$PPT_FILE" | grep -c "slide[0-9]*\.xml")
echo "Total slides: $PAGE_COUNT"

# 2. 逐页提取
for i in $(seq 1 $PAGE_COUNT); do
  echo "=== Slide $i ==="
  unzip -p "$PPT_FILE" "ppt/slides/slide$i.xml" 2>/dev/null | sed 's/<[^>]*>//g' | tr -s ' \n'
  echo ""
done

Comments

Loading comments...