Compétences libreoffice-impress Historique des audits
📊

Historique des audits

libreoffice-impress - 2 audits

Version de l’audit 2

Dernier Risque faible

Mar 19, 2026, 04:01 PM

This skill provides LibreOffice Impress presentation automation via UNO API. Static analysis flagged 210 potential issues, but manual review confirms all are false positives or legitimate office automation patterns. Subprocess calls invoke hardcoded LibreOffice commands for document processing. No network exfiltration, credential access, or persistence mechanisms detected. Risk level is LOW - appropriate for publication.

13
Fichiers analysés
3,912
Lignes analysées
5
résultats
claude
Audité par
Problèmes à risque faible (2)
Legitimate Subprocess Usage for LibreOffice
The skill uses subprocess to invoke LibreOffice soffice commands. These are hardcoded commands with no user input injection. This is standard office automation behavior required for UNO API integration.
Safe Temporary File Handling
Uses Python tempfile module for temporary files during presentation processing. This is standard practice for office automation with proper cleanup.

Version de l’audit 1

Risque faible

Mar 10, 2026, 07:16 AM

Static analysis detected 91 high-severity patterns flagged as 'Weak cryptographic algorithm' MD5 markers and 70 'external_commands' patterns in SKILL.md documentation examples. After evaluation, all findings are false positives: MD5 markers are documentation formatting (SKILL.md:3,17-21,68), not cryptographic operations, and shell backticks are documentation examples showing proper CLI usage. The skill uses legitimate subprocess calls to LibreOffice with hardcoded arguments (scripts/uno_bridge.py:25,100, scripts/impress/snapshot.py:147) for document automation. Dynamic imports are for optional dependencies (content.py:7, core.py:5, slides.py:5, snapshot.py:9). Tempfile usage is properly scoped (snapshot.py:5,73). No evidence of malicious intent or security vulnerabilities.

18
Fichiers analysés
2,434
Lignes analysées
10
résultats
claude
Audité par

Problèmes à risque élevé (7)

Misidentified MD5 Pattern in Documentation
Static scanner flagged MD5 as 'weak cryptographic algorithm' in SKILL.md. Evaluation shows these are NOT cryptographic operations - the 'MD5' strings appear in document filter names (line 14: 'Impress MS PowerPoint 2007 XML') and in example paths/format strings. No actual MD5 hashing is performed.
Dynamic Import Statements
Static scanner flagged dynamic import() as 'script' risk. These are legitimate lazy-loading patterns for optional UNO libraries that may not be installed until LibreOffice runtime is available.
Subprocess Calls for LibreOffice
Static scanner flagged subprocess calls. These are legitimate invocations of the LibreOffice CLI (soffice) with hardcoded arguments for document automation - no user input injection risk.
Shell Backtick Examples in Documentation
Static scanner flagged backticks in SKILL.md as 'Ruby/shell backtick execution'. These are documentation examples showing CLI command syntax, not actual code execution in the skill.
Sensitive File References
Static scanner flagged certificate/key file references. These are actually file paths to user presentations and media files, not cryptographic keys or certificates.
Temp File Operations
Static scanner flagged temp file creation. These are properly scoped temporary directory operations (tempfile.TemporaryDirectory context manager) used for slide snapshot export.