skills/eyadsibai/ltk/xlsx/Gen Agent Trust Hub

xlsx

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • Persistence Mechanisms (MEDIUM): The script modifies the user's permanent environment by writing a LibreOffice macro file (Module1.xba) to the application's configuration directory (~/.config/libreoffice/ or ~/Library/Application Support/LibreOffice/). This ensures the code persists across office sessions. Evidence: recalc.py writes the macro in the setup_libreoffice_macro function.\n- Dynamic Execution (MEDIUM): The tool generates StarBasic macro code from an internal string template and saves it to the local filesystem to be triggered via the soffice binary. Evidence: recalc.py defines macro_content and writes it to a file before execution.\n- Indirect Prompt Injection (LOW): The skill processes untrusted Excel files provided as input. 1. Ingestion points: Excel files loaded via openpyxl and soffice from paths provided in command line arguments. 2. Boundary markers: None; the tool processes the file content directly. 3. Capability inventory: Subprocess execution of system binaries (soffice) and file system writes to configuration paths. 4. Sanitization: None; the script verifies file existence but does not validate the integrity or safety of the Excel file structure or contents before processing.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 05:58 PM