xlsx

Warn

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: MEDIUMCOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill invokes several powerful system commands to facilitate Office document manipulation and recalculation.
  • In scripts/office/soffice.py, the skill uses gcc to compile an embedded C source code shim into a shared object file at runtime.
  • It subsequently launches the soffice (LibreOffice) process with the LD_PRELOAD environment variable set to inject the compiled library, bypassing Unix socket restrictions often found in sandboxed environments.
  • In scripts/recalc.py, the skill executes soffice to trigger automated formula recalculation.
  • scripts/office/validators/redlining.py uses git diff to perform version comparisons for Word document tracked changes.
  • [COMMAND_EXECUTION]: The skill ensures persistence of its recalculation tools by modifying local application settings.
  • scripts/recalc.py automatically writes a StarBasic macro (Module1.xba) to the user's LibreOffice configuration directory (~/.config/libreoffice/ or ~/Library/Application Support/LibreOffice/). This macro remains available to the Office suite across different sessions.
  • [REMEDIATION]: Users should validate that the runtime compilation and LD_PRELOAD shimming are acceptable within their environment's security policy. The installation of persistent macros into the LibreOffice user profile should be reviewed to ensure it does not conflict with existing Office automation or security settings.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 1, 2026, 05:09 PM