xlsx
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/office/soffice.pydynamically generates C source code, compiles it usinggccat runtime, and injects the resulting shared library into thesofficeprocess via theLD_PRELOADenvironment variable. This is a high-risk technique for process hijacking and dynamic code execution.\n- [COMMAND_EXECUTION]: Thescripts/recalc.pyscript establishes persistence and modifies application behavior by writing a custom LibreOffice Basic macro (Module1.xba) into the user's local configuration directory.\n- [COMMAND_EXECUTION]: Several utility scripts execute system-level commands via the subprocess module, includinggccfor compilation,sofficefor application execution, andgitfor differencing.\n- [PROMPT_INJECTION]: The skill has a large attack surface for indirect prompt injection (Category 8).\n - Ingestion points: Spreadsheet data is ingested through
pandas.read_excelandopenpyxl.load_workbookas shown inSKILL.md.\n - Boundary markers: There are no explicit delimiters or instructions to the agent to ignore embedded commands in the source files.\n
- Capability inventory: The skill possesses high-privilege capabilities including arbitrary file system writes and subprocess command execution.\n
- Sanitization: Data from spreadsheet cells is processed without explicit sanitization or validation before being integrated into the workflow.
Audit Metadata