xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- DYNAMIC_EXECUTION (MEDIUM): The script dynamically generates a StarBasic macro (
Module1.xba) and writes it to the local filesystem at runtime before execution. This is a form of runtime code generation.\n- COMMAND_EXECUTION (MEDIUM): The script executes system commands viasubprocess.runto invoke thesofficebinary. Although it uses list-based arguments to prevent shell injection, it triggers the execution of a custom macro generated by the script.\n- PERSISTENCE (MEDIUM): The script modifies the user's LibreOffice configuration directory by installing a persistent macro in the standard application path. This artifact remains in the user's application profile after the script completes execution.\n- INDIRECT_PROMPT_INJECTION (LOW): The skill processes external Excel files which could contain malicious formulas designed to exploit the recalculation engine or the script's error-scanning logic. \n - Ingestion points: Excel file input (
filenameparameter inrecalc.py).\n - Boundary markers: Absent; the script does not validate the content or source of the Excel file.\n
- Capability inventory: File system write (macro creation),
subprocess.runexecution (LibreOffice), andopenpyxlfile reading.\n - Sanitization: Absent; the script extracts cell values directly to check for error strings without sanitizing the input data.
Audit Metadata