excel
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [Command Execution] (MEDIUM): The script
scripts/recalc.pyusessubprocess.runto execute system binaries, specificallysoffice(LibreOffice),timeout, andgtimeout, to perform headless formula recalculation. - Evidence: Found in
scripts/recalc.py(lines 78-100), where it constructs and executes shell commands to trigger a specific LibreOffice macro. - [Dynamic Execution] (MEDIUM): The skill dynamically generates a StarBasic macro (
Module1.xba) and writes it to the user's persistent LibreOffice profile directory (e.g.,~/.config/libreoffice/or~/Library/Application Support/LibreOffice/). This modifies the system's application environment to enable the recalculation feature. - Evidence:
scripts/recalc.py(lines 18-49) contains the logic to create the macro XML file if it does not already exist. - [Indirect Prompt Injection] (LOW): The skill processes external Excel files and iterates through all cells to find specific error strings, creating a surface for potential data-driven influence through untrusted inputs.
- Ingestion points:
recalc()function inscripts/recalc.pyloads user-provided workbook data using theopenpyxllibrary. - Boundary markers: Absent; the script scans all cell values without explicitly defined safety delimiters for content analysis.
- Capability inventory: Subprocess execution of
sofficeand file system writes to the user's configuration path. - Sanitization: Absent; the script performs simple string matching on cell values to detect formula errors.
Audit Metadata