skills/zephyrwang6/myskill/xlsx/Gen Agent Trust Hub

xlsx

Warn

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • COMMAND_EXECUTION (MEDIUM): The skill uses subprocess.run to execute soffice (LibreOffice) and potentially timeout/gtimeout. While it uses a list for command arguments to mitigate shell injection, it still executes arbitrary system binaries.
  • PERSISTENCE (MEDIUM): In recalc.py, the setup_libreoffice_macro function writes a persistent StarBasic macro to ~/.config/libreoffice/4/user/basic/Standard/Module1.xba (or the macOS equivalent). This code persists in the user's LibreOffice profile after the script completes.
  • DYNAMIC_EXECUTION (MEDIUM): The script dynamically generates StarBasic XML content (RecalculateAndSave) and writes it to a file before execution. This is a form of script generation and execution (Category 10).
  • INDIRECT_PROMPT_INJECTION (MEDIUM): The skill processes external Excel files provided via command line arguments. These files are opened and processed by LibreOffice with the custom macro. Maliciously crafted filenames or Excel content could potentially exploit vulnerabilities in LibreOffice's file handling or macro execution environment.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 16, 2026, 01:56 AM