xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
recalc.pyexecutes thesoffice(LibreOffice) binary viasubprocess.run. Although it passes arguments as a list to prevent shell injection, it invokes external system-level software with access to the filesystem. - [PERSISTENCE] (MEDIUM): The
setup_libreoffice_macrofunction inrecalc.pywrites a StarBasic macro (Module1.xba) to the user's local LibreOffice configuration directory (~/.config/libreoffice or ~/Library/Application Support/LibreOffice). This modification persists across sessions and modifies the behavior of the LibreOffice application. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill processes untrusted Excel files, creating a surface for indirect prompt injection. 1. Ingestion points:
load_workbook(filename)inrecalc.py. 2. Boundary markers: Absent. 3. Capability inventory:subprocess.run(command execution) andopenpyxl(file reading). 4. Sanitization: Absent; cell values are extracted and reported to the agent, which could be manipulated if cell content contains malicious instructions.
Audit Metadata