xlsx

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION] (LOW): The script invokes 'soffice' and system timeout commands using subprocess.run. It passes user-controlled file paths as arguments, which, while handled as a list to mitigate shell injection, still involves executing external binary applications with complex input.
  • [DYNAMIC_EXECUTION] (LOW): The script writes a StarBasic macro file to the LibreOffice configuration directory and then triggers its execution via a URI. This pattern of generating and then running executable code on the host is a significant, though task-relevant, behavior.
  • [PERSISTENCE] (LOW): The macro is written to the 'Standard' macro library in the user's persistent application configuration directory (~/.config/libreoffice or similar). This creates a lasting artifact that remains available in the user's LibreOffice environment after the script's execution.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:42 PM