xlsx
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The skill uses
subprocess.runto executesoffice(LibreOffice) and potentiallytimeout/gtimeout. While it uses a list for command arguments to mitigate shell injection, it still executes arbitrary system binaries. - PERSISTENCE (MEDIUM): In
recalc.py, thesetup_libreoffice_macrofunction writes a persistent StarBasic macro to~/.config/libreoffice/4/user/basic/Standard/Module1.xba(or the macOS equivalent). This code persists in the user's LibreOffice profile after the script completes. - DYNAMIC_EXECUTION (MEDIUM): The script dynamically generates StarBasic XML content (
RecalculateAndSave) and writes it to a file before execution. This is a form of script generation and execution (Category 10). - INDIRECT_PROMPT_INJECTION (MEDIUM): The skill processes external Excel files provided via command line arguments. These files are opened and processed by LibreOffice with the custom macro. Maliciously crafted filenames or Excel content could potentially exploit vulnerabilities in LibreOffice's file handling or macro execution environment.
Audit Metadata