xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Dynamic Execution] (MEDIUM): The script
scripts/office/soffice.pyimplements runtime compilation of an embedded C source file usinggcc. The resulting shared library is then injected into thesoffice(LibreOffice) process using theLD_PRELOADenvironment variable. This technique is used to shim Unix socket behavior in environments where they are restricted, but it represents a high-risk execution pattern. - [Persistence Mechanisms] (MEDIUM):
scripts/recalc.pyautomatically generates and writes a StarBasic macro (Module1.xba) to the user's LibreOffice configuration directory (e.g.,~/.config/libreoffice/). This modification persists across application sessions to enable the formula recalculation feature. - [Command Execution] (LOW): The skill invokes several system binaries including
gcc,soffice, andgitviasubprocess.runto perform its primary tasks. - [Indirect Prompt Injection] (LOW): The skill processes untrusted Office documents, creating a surface for indirect attacks if document content is interpreted as instructions by the agent.
- Ingestion points:
scripts/office/unpack.py(extracts ZIP archives) andscripts/recalc.py(loads Excel workbooks). - Boundary markers: None detected in the script logic to delimit external data from instructions.
- Capability inventory: Subprocess execution of
soffice,gcc, andgit, as well as extensive file system write permissions. - Sanitization: The skill largely uses
defusedxmlto mitigate XML External Entity (XXE) risks. However,scripts/office/validators/pptx.pyutilizeslxml.etree.parsewithout explicit safety flags, andscripts/office/unpack.pyuseszipfile.extractall(), which is vulnerable to ZipSlip path traversal if processing maliciously crafted archives.
Audit Metadata