xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The script utilizes
subprocess.runto invoke system binaries includingsoffice(LibreOffice) andtimeout/gtimeout. Although it uses list-based arguments to mitigate shell injection, executing external binaries with file paths is a sensitive operation. - REMOTE_CODE_EXECUTION (MEDIUM): The script performs dynamic code generation by writing a StarBasic macro (
Module1.xba) to the user's LibreOffice configuration directory and then executing it via a custom URI scheme. This modifies the persistent state and execution flow of the local office suite. - PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection from malicious Excel files. 1. Ingestion points:
recalc.py(viaopenpyxl). 2. Boundary markers: None present. 3. Capability inventory: Subprocess execution and filesystem writes. 4. Sanitization: No validation of workbook content before processing.
Audit Metadata