xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- Persistence Mechanisms (MEDIUM): The script modifies the user's permanent environment by writing a LibreOffice macro file (
Module1.xba) to the application's configuration directory (~/.config/libreoffice/or~/Library/Application Support/LibreOffice/). This ensures the code persists across office sessions. Evidence:recalc.pywrites the macro in thesetup_libreoffice_macrofunction.\n- Dynamic Execution (MEDIUM): The tool generates StarBasic macro code from an internal string template and saves it to the local filesystem to be triggered via thesofficebinary. Evidence:recalc.pydefinesmacro_contentand writes it to a file before execution.\n- Indirect Prompt Injection (LOW): The skill processes untrusted Excel files provided as input. 1. Ingestion points: Excel files loaded viaopenpyxlandsofficefrom paths provided in command line arguments. 2. Boundary markers: None; the tool processes the file content directly. 3. Capability inventory: Subprocess execution of system binaries (soffice) and file system writes to configuration paths. 4. Sanitization: None; the script verifies file existence but does not validate the integrity or safety of the Excel file structure or contents before processing.
Audit Metadata