xlsx

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [Persistence Mechanisms] (MEDIUM): The script writes a StarBasic macro to the user's LibreOffice configuration directory (e.g., ~/.config/libreoffice/4/user/basic/Standard/Module1.xba). This modification persists across all future uses of LibreOffice on the system.
  • [Dynamic Execution] (MEDIUM): The script programmatically generates XML-based macro code and writes it to the file system to be executed via a subprocess call to 'soffice'.
  • [Command Execution] (LOW): The script uses subprocess.run to execute external binaries including 'soffice', 'timeout', and 'gtimeout'. While it passes arguments as a list to mitigate shell injection, the reliance on system-level binaries and path resolution presents a minor risk.
  • [Indirect Prompt Injection] (LOW): The skill possesses an attack surface for indirect injection by processing untrusted Excel files using openpyxl and LibreOffice.
  • Ingestion points: filename argument processed in recalc.py.
  • Boundary markers: None (direct file ingestion).
  • Capability inventory: Subprocess execution (soffice), file writing (macro creation).
  • Sanitization: No specific sanitization of file content or structure before processing.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 05:55 PM