xlsx
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes several powerful system commands to facilitate Office document manipulation and recalculation.
- In
scripts/office/soffice.py, the skill usesgccto compile an embedded C source code shim into a shared object file at runtime. - It subsequently launches the
soffice(LibreOffice) process with theLD_PRELOADenvironment variable set to inject the compiled library, bypassing Unix socket restrictions often found in sandboxed environments. - In
scripts/recalc.py, the skill executessofficeto trigger automated formula recalculation. scripts/office/validators/redlining.pyusesgit diffto perform version comparisons for Word document tracked changes.- [COMMAND_EXECUTION]: The skill ensures persistence of its recalculation tools by modifying local application settings.
scripts/recalc.pyautomatically writes a StarBasic macro (Module1.xba) to the user's LibreOffice configuration directory (~/.config/libreoffice/or~/Library/Application Support/LibreOffice/). This macro remains available to the Office suite across different sessions.- [REMEDIATION]: Users should validate that the runtime compilation and LD_PRELOAD shimming are acceptable within their environment's security policy. The installation of persistent macros into the LibreOffice user profile should be reviewed to ensure it does not conflict with existing Office automation or security settings.
Audit Metadata