libreoffice-writer
Pass
Audited by Gen Agent Trust Hub on Apr 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill launches the LibreOffice process headlessly via
subprocess.Popeninscripts/uno_bridge.pyto handle document edits. This is a functional requirement for the skill's purpose but represents an execution surface for local binaries. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by reading data from external ODT and MD files without protective boundaries or sanitization. Ingestion points: Documents are read using
read_textinscripts/writer/session.pyand during source imports inscripts/writer/core.py. Boundary markers: Content from files is ingested without delimiters or specific instructions to treat it as untrusted. Capability inventory: The skill can execute local commands and perform file system writes. Sanitization: Text extracted from documents is not validated or sanitized before being provided to the agent.
Audit Metadata