xlsx
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTION
Full Analysis
- Dynamic Execution (HIGH): The script generates a StarBasic macro (
Module1.xba) and writes it to the user's permanent LibreOffice profile directory (~/.config/libreoffice/or~/Library/Application Support/LibreOffice/). It then executes this generated code via thesofficecommand-line interface using avnd.sun.star.scriptURI. This 'generate-then-execute' pattern in a persistent configuration path is a significant security risk. - Indirect Prompt Injection (HIGH): The skill is designed to process external, untrusted Excel files.
- Ingestion points:
recalc.pyaccepts a filename argument and processes the file's contents using bothopenpyxland LibreOffice. - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded malicious content within the Excel files.
- Capability inventory: The skill can execute arbitrary commands via
subprocess.run(soffice, timeout, gtimeout) and perform file-write operations through the LibreOffice macro (ThisComponent.store()). - Sanitization: None. The script does not validate or sanitize the Excel file before opening it in a high-privilege office environment.
- Persistence Mechanism (MEDIUM): By installing a macro into the global LibreOffice 'Standard' library, the skill makes a persistent change to the user's environment that remains active across all future LibreOffice sessions, even when the skill is not running.
Recommendations
- AI detected serious security threats
Audit Metadata