xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- Dynamic Execution (MEDIUM): The script
recalc.pydynamically generates a LibreOffice Basic macro (Module1.xba) and writes it to the local user's configuration directory (e.g.,~/.config/libreoffice/). It then executes this macro using thesofficecommand-line interface. Script generation combined with execution is a sensitive pattern that could be abused if the generation logic is manipulated. - Command Execution (LOW): The skill uses
subprocess.runto callsofficeandtimeoututilities. Although arguments are passed as a list (mitigating shell injection), the script relies on the presence and integrity of these system-level binaries. - Indirect Prompt Injection (LOW): The script processes untrusted Excel files by iterating through all sheets and cells. This exposes the agent to vulnerabilities in the
openpyxllibrary or the LibreOffice calculation engine if a malicious file is provided. - Ingestion points:
recalc.pyopens user-provided Excel files usingload_workbook. - Boundary markers: Absent. The script processes the raw content of the workbook without sanitization.
- Capability inventory: The script can execute subprocesses (
soffice) and write files to the user's home directory config folders. - Sanitization: None. The script reads and interprets cell values directly to identify error strings.
Audit Metadata