xlsx
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill performs runtime C compilation and process injection via LD_PRELOAD.
- Evidence:
scripts/office/soffice.pycontains an embedded C source string (_SHIM_SOURCE) designed to hook system-level operations likesocket,listen, andaccept. - Process: The skill writes this source to disk, compiles it at runtime using
gcc -shared -fPIC, and then injects the resulting shared object into thesofficeprocess environment via theLD_PRELOADvariable. This technique is extremely invasive and is a common vector for process hijacking or environment manipulation. - [COMMAND_EXECUTION] (HIGH): The skill modifies persistent application configurations to enable automated macro execution.
- Evidence:
recalc.pyandscripts/recalc.pyinclude asetup_libreoffice_macrofunction that identifies the host's LibreOffice user profile directory and writes a custom StarBasic macro toModule1.xba. - Risk: Modifying persistent application configurations to enable automated code execution (macros) establishes a persistence mechanism. This environment change remains across sessions and could be exploited if malicious content triggers the macro.
- [PROMPT_INJECTION] (LOW): The skill is susceptible to Indirect Prompt Injection (Category 8) due to its data processing model.
- Ingestion points:
unpack.py,recalc.py, andvalidate.pyaccept and process untrusted Office document files (.docx, .pptx, .xlsx) from external sources. - Boundary markers: There are no explicit boundary markers or instructions used to separate untrusted document content from agent instructions during processing.
- Capability inventory: The skill possesses high-privilege capabilities including subprocess execution (
gcc,soffice,git) and the ability to modify filesystem configurations. - Sanitization: While it uses
defusedxmlto mitigate XML-based attacks (XXE), it lacks sanitization for the logical content of the documents which might influence subsequent agent actions or be used in the recalculation logic.
Recommendations
- AI detected serious security threats
Audit Metadata