xlsx
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Runtime compilation and process injection are used to shim system calls.
- Evidence:
scripts/office/soffice.pywrites C source code to a temporary file and compiles it into a shared library usinggcc. - Evidence: It executes
sofficewithLD_PRELOADset to the path of the compiled shared object to facilitate socket operations in restricted environments. - [COMMAND_EXECUTION]: Several scripts invoke system-level utilities.
- Evidence:
scripts/recalc.pyandscripts/office/validate.pyperform subprocess calls tosoffice,git, andgtimeout. - [PROMPT_INJECTION]: The skill processes untrusted spreadsheet data and possesses powerful tool capabilities, creating a surface for indirect prompt injection.
- Ingestion points: Data from spreadsheet files is ingested using
pandasandopenpyxl. - Boundary markers: No delimiters or instructions are used to isolate untrusted data from the agent prompt.
- Capability inventory: The skill can execute shell commands and write to the local file system.
- Sanitization: No sanitization or validation of the ingested data is performed.
Audit Metadata