xlsx
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill performs runtime compilation and process injection to ensure tool compatibility in restricted environments.
scripts/office/soffice.pywrites C source code to a temporary file and compiles it into a shared object usinggcc.- The resulting library is injected into the LibreOffice (
soffice) process via theLD_PRELOADenvironment variable to modify low-level socket handling behavior. - [COMMAND_EXECUTION]: The skill invokes multiple system utilities through the Python
subprocessmodule for document processing tasks. scripts/recalc.pyexecutes thesofficebinary to update spreadsheet formula values and utilizestimeoutorgtimeoutfor process lifecycle management.scripts/office/soffice.pycallsgccto compile its compatibility shim at runtime.scripts/office/validators/redlining.pyusesgit diffto perform word-level comparisons of document versions.- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface due to its data ingestion capabilities.
- Ingestion points: Reads content from external spreadsheet and Word document files (
.xlsx,.csv,.docx) inscripts/recalc.pyand via instructions inSKILL.md. - Boundary markers: Lacks explicit delimiters or instructions to ignore instructions embedded within the user-provided data files.
- Capability inventory: Provides significant file system access and system command execution capabilities through the document processing toolchain.
- Sanitization: Employs
defusedxmlto mitigate XML External Entity (XXE) attacks, but does not sanitize the textual or formula content against logic-based injection.
Audit Metadata