Histórico de Auditoria
libreoffice-calc - 2 auditorias
Versão da auditoria 2
Mais recente Baixo RiscoMar 19, 2026, 03:59 PM
Static analysis flagged 197 patterns across 13 files. After evaluation, all high-severity findings are false positives: cryptographic warnings misidentified UNO connection code, 'system reconnaissance' flagged exception class definitions, and 'dynamic imports' were standard Python import statements. Shell command patterns exist only in markdown documentation. The single confirmed external command (subprocess.Popen launching LibreOffice) uses hardcoded arguments with no user input injection risk. Temp file usage follows Python best practices with proper cleanup. Skill is safe for publication with minor documentation recommended.
Problemas de Baixo Risco (2)
Fatores de risco
⚙️ Comandos externos (1)
📁 Acesso ao sistema de arquivos (2)
🔑 Variáveis de ambiente (1)
Versão da auditoria 1
SeguroMar 10, 2026, 07:13 AM
All 88 static findings are false positives. The skill provides legitimate LibreOffice Calc automation via UNO API. Subprocess calls only launch LibreOffice with hardcoded arguments for spreadsheet operations. No cryptographic functions, no malicious code, no user input injection vectors.