xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- Dynamic Execution (HIGH): The module
scripts/office/soffice.pydynamically generates C source code, compiles it into a shared library usinggcc, and loads it into thesofficeprocess using theLD_PRELOADenvironment variable to intercept system calls. This behavior is associated with the skill's primary purpose of ensuring LibreOffice functionality in restricted environments.\n - Evidence:
subprocess.run(["gcc", "-shared", "-fPIC", "-o", str(_SHIM_SO), str(src), "-ldl"], ...)andenv["LD_PRELOAD"] = str(shim)inscripts/office/soffice.py.\n- Persistence (MEDIUM): The scriptscripts/recalc.pyinstalls a StarBasic macro into the user's global LibreOffice configuration directory. This change persists across sessions and modifies the application's default behavior.\n - Evidence: Writing
RECALCULATE_MACROto path strings defined byMACRO_DIR_MACOSandMACRO_DIR_LINUXinscripts/recalc.py.\n- Indirect Prompt Injection (LOW): The skill processes untrusted Office documents and has significant system capabilities, creating an attack surface for data-driven exploits. While some sanitization is present, the skill remains vulnerable to malicious data targeting its underlying tools.\n - Ingestion points: Processes .docx, .pptx, and .xlsx files via
unpack.py,validate.py, andrecalc.py.\n - Boundary markers: Absent.\n
- Capability inventory: Subprocess execution of
gcc,git, andsoffice; arbitrary file writing for shims and macros.\n - Sanitization: Consistent use of
defusedxmlfor XML parsing in multiple helper modules, althoughlxml.etreeandxml.etree.ElementTreeare used directly inpptx.pyandredlining.py.\n- Command Execution (LOW): The skill makes extensive use of thesubprocessmodule to call system utilities such asgit,gcc, andsoffice.\n - Evidence:
subprocess.runcalls inscripts/office/soffice.py,scripts/office/validators/redlining.py, andscripts/recalc.py.
Audit Metadata