xlsx
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
recalc.pyscript invokes thesoffice(LibreOffice) binary viasubprocess.runto perform headless formula recalculations. It also interacts with system utilities liketimeoutorgtimeoutfor process management. - [COMMAND_EXECUTION]: The script dynamically creates and persists a LibreOffice Basic macro file (
Module1.xba) in the user's local application configuration directory to automate workbook recalculation. - [PROMPT_INJECTION]: The skill processes untrusted spreadsheet data, presenting an indirect prompt injection surface.
- Ingestion points: External data enters through
pandas.read_excelandopenpyxl.load_workbookoperations inSKILL.mdexamples andrecalc.py. - Boundary markers: The skill logic does not include specific delimiters or warnings to ignore instructions embedded within the spreadsheet data.
- Capability inventory: The skill has capabilities for file system operations and command execution via the
recalc.pyscript. - Sanitization: No sanitization or validation of the retrieved cell content is implemented to prevent processing of malicious instructions.
Audit Metadata