xlsx
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes external binaries including
soffice(LibreOffice),git, andgccusingsubprocess.run. These executions use list-based arguments, which is a secure implementation that prevents shell command injection vulnerabilities.\n- [COMMAND_EXECUTION]: Inscripts/office/soffice.py, the skill performs runtime compilation of a C shared library (lo_socket_shim.so) from an embedded source string. This library is then injected into the LibreOffice process using theLD_PRELOADenvironment variable to shim UNIX socket calls, allowing the application to run in restricted sandbox environments.\n- [COMMAND_EXECUTION]: Thescripts/recalc.pyscript automatically installs a StarBasic macro into the LibreOffice user configuration directory. This macro is used to automate the recalculation and saving of spreadsheet files, though it also functions as a persistence mechanism within the LibreOffice application environment.\n- [SAFE]: The skill demonstrates defensive programming by utilizing thedefusedxmllibrary for XML parsing across its validation and processing scripts. This provides protection against XML External Entity (XXE) expansion attacks when handling untrusted Office documents.
Audit Metadata