xlsx

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • COMMAND_EXECUTION (MEDIUM): The script utilizes subprocess.run to invoke system binaries including soffice (LibreOffice) and timeout/gtimeout. Although it uses list-based arguments to mitigate shell injection, executing external binaries with file paths is a sensitive operation.
  • REMOTE_CODE_EXECUTION (MEDIUM): The script performs dynamic code generation by writing a StarBasic macro (Module1.xba) to the user's LibreOffice configuration directory and then executing it via a custom URI scheme. This modifies the persistent state and execution flow of the local office suite.
  • PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection from malicious Excel files. 1. Ingestion points: recalc.py (via openpyxl). 2. Boundary markers: None present. 3. Capability inventory: Subprocess execution and filesystem writes. 4. Sanitization: No validation of workbook content before processing.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 06:49 PM