Historique des audits
libreoffice-writer - 2 audits
Version de l’audit 2
Dernier Risque faibleMar 19, 2026, 04:04 PM
Static analysis flagged 175 patterns but evaluation confirms these are false positives. The skill legitimately uses subprocess to launch LibreOffice with hardcoded arguments, tempfile for secure temp directories, and importlib for module detection. All external command usage has no user input injection vectors. Risk is low due to filesystem and external command dependencies requiring LibreOffice installation.
Problèmes à risque faible (3)
Facteurs de risque
⚙️ Commandes externes (1)
📁 Accès au système de fichiers (2)
🔑 Variables d’environnement (1)
⚡ Contient des scripts (2)
Version de l’audit 1
SûrMar 10, 2026, 07:18 AM
Static analysis flagged 87 potential issues, but manual review confirms all are false positives. The skill is legitimate LibreOffice Writer automation using UNO bridge. Subprocess calls are for finding/launching LibreOffice, not user-controlled command execution. CSS color codes were misidentified as cryptographic hashes. Dynamic imports are standard UNO library loading patterns.