xlsx
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/office/soffice.pygenerates C source code at runtime, compiles it into a shared library usinggcc, and then uses theLD_PRELOADenvironment variable to inject this library into thesofficeprocess. This is designed to shim socket calls when running in restricted environments. - [COMMAND_EXECUTION]: Multiple scripts utilize
subprocess.runto execute external commands, includingsofficefor formula recalculation,gccfor its internal socket shim, andgitfor document validation. - [PROMPT_INJECTION]: The skill processes data from external spreadsheet files (.xlsx, .csv), creating an attack surface for indirect prompt injection.
- Ingestion points: Untrusted data enters the context through
pandasandopenpyxlcalls, specifically withinscripts/recalc.py. - Boundary markers: No specific delimiters or warnings against embedded instructions are implemented in the file processing scripts.
- Capability inventory: The skill has access to shell execution, file system writes, and local compilation tools.
- Sanitization: The skill uses
defusedxml.minidomto protect against XML-based vulnerabilities while parsing document structure.
Audit Metadata