xlsx
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (SAFE): The
recalc.pyscript usessubprocess.runto callsoffice. Commands are constructed using argument lists rather than shell strings, which effectively mitigates shell injection risks. The usage ofgtimeoutortimeoutis a standard practice for managing external process execution. - INDIRECT_PROMPT_INJECTION (LOW): The skill processes untrusted Excel data which could contain malicious instructions.
- Ingestion points: Files processed via
load_workbookandrecalc(filename)inrecalc.py. - Boundary markers: Not explicitly defined in the script's logic when reading cell values.
- Capability inventory: Subprocess execution of LibreOffice and filesystem write access to the LibreOffice configuration directory.
- Sanitization: The script specifically filters for known Excel error strings (e.g., #REF!, #VALUE!) but does not sanitize cell content before processing.
- PRIVILEGE_ESCALATION (SAFE): While the script writes to the user's application configuration directory (
~/.config/libreofficeor~/Library/Application Support/), this is a standard requirement for configuring LibreOffice macros and does not involvesudoor unauthorized permission changes. - EXTERNAL_DOWNLOADS (SAFE): The skill is associated with the
anthropicsorganization, which is a Trusted External Source according to the [TRUST-SCOPE-RULE].
Audit Metadata