excel

Warn

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [Command Execution] (MEDIUM): The script scripts/recalc.py uses subprocess.run to execute system binaries, specifically soffice (LibreOffice), timeout, and gtimeout, to perform headless formula recalculation.
  • Evidence: Found in scripts/recalc.py (lines 78-100), where it constructs and executes shell commands to trigger a specific LibreOffice macro.
  • [Dynamic Execution] (MEDIUM): The skill dynamically generates a StarBasic macro (Module1.xba) and writes it to the user's persistent LibreOffice profile directory (e.g., ~/.config/libreoffice/ or ~/Library/Application Support/LibreOffice/). This modifies the system's application environment to enable the recalculation feature.
  • Evidence: scripts/recalc.py (lines 18-49) contains the logic to create the macro XML file if it does not already exist.
  • [Indirect Prompt Injection] (LOW): The skill processes external Excel files and iterates through all cells to find specific error strings, creating a surface for potential data-driven influence through untrusted inputs.
  • Ingestion points: recalc() function in scripts/recalc.py loads user-provided workbook data using the openpyxl library.
  • Boundary markers: Absent; the script scans all cell values without explicitly defined safety delimiters for content analysis.
  • Capability inventory: Subprocess execution of soffice and file system writes to the user's configuration path.
  • Sanitization: Absent; the script performs simple string matching on cell values to detect formula errors.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 06:18 PM