xlsx-processing-anthropic
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.runto execute external commands. Specifically,scripts/recalc.pyrunssoffice(LibreOffice) to update formula values, andscripts/office/validators/redlining.pyexecutesgit diffto compare document versions. - [REMOTE_CODE_EXECUTION]: The script
scripts/office/soffice.pyperforms runtime code generation and process injection. It writes a C source file to the temporary directory, compiles it into a shared library usinggcc, and uses theLD_PRELOADenvironment variable to inject the shim into the LibreOffice process. This technique is used to bypass socket restrictions in sandboxed environments but constitutes dynamic code execution. - [PROMPT_INJECTION]: The skill represents a surface for indirect prompt injection as it processes untrusted spreadsheet data and possesses powerful system capabilities.
- Ingestion points: Spreadsheet files are read by
scripts/recalc.pyand unpacked byscripts/office/unpack.py. - Boundary markers: Absent; there are no delimiters to distinguish user data from instructions within the processed spreadsheets.
- Capability inventory: The skill can execute shell commands and generate binary code at runtime.
- Sanitization: Uses the
defusedxmllibrary for XML parsing to mitigate common XML-based attacks.
Audit Metadata