xlsx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- Prompt Injection (HIGH): The skill is highly vulnerable to Indirect Prompt Injection because it is designed to ingest, analyze, and 'exactly match' the formatting of external Excel and CSV files.
- Ingestion points:
SKILL.mdandreferences/openpyxl-patterns.mddemonstrate loading untrusted data usingpd.read_excel()andload_workbook(). - Boundary markers: Absent. There are no instructions to treat cell content as untrusted or to ignore embedded instructions. The instruction to 'study and EXACTLY match' existing patterns increases the risk of the agent obeying hidden instructions in cell metadata or text.
- Capability inventory: The agent has full access to the Python environment (pandas, openpyxl), file system (reading/writing spreadsheets), and the ability to execute the
recalc.pywrapper script. - Sanitization: Absent. Data is processed directly by the libraries and used to influence the agent's next steps, such as fixing errors identified by
recalc.py. - Command Execution (MEDIUM): The
recalc.pyscript usessubprocess.run()to execute system-level commands (soffice,timeout,gtimeout). While it avoids direct shell interpolation by using a list of arguments, it relies on the presence and specific configuration of external system binaries which could be exploited in shared environments. - Persistence Mechanisms (MEDIUM):
recalc.pycontains logic insetup_libreoffice_macro()to write a StarBasic macro to the user's local LibreOffice configuration directory (~/.config/libreoffice/or~/Library/Application Support/LibreOffice/). Modifying application configuration files to enable execution of custom macros is a security risk and functions as a form of persistence.
Recommendations
- AI detected serious security threats
Audit Metadata