Audit History
libreoffice-calc - 2 audits
Audit version 2
Latest Low RiskMar 19, 2026, 03:59 PM
Static analysis flagged 197 patterns across 13 files. After evaluation, all high-severity findings are false positives: cryptographic warnings misidentified UNO connection code, 'system reconnaissance' flagged exception class definitions, and 'dynamic imports' were standard Python import statements. Shell command patterns exist only in markdown documentation. The single confirmed external command (subprocess.Popen launching LibreOffice) uses hardcoded arguments with no user input injection risk. Temp file usage follows Python best practices with proper cleanup. Skill is safe for publication with minor documentation recommended.
Low Risk Issues (2)
Risk Factors
⚙️ External commands (1)
📁 Filesystem access (2)
🔑 Env variables (1)
Audit version 1
SafeMar 10, 2026, 07:13 AM
All 88 static findings are false positives. The skill provides legitimate LibreOffice Calc automation via UNO API. Subprocess calls only launch LibreOffice with hardcoded arguments for spreadsheet operations. No cryptographic functions, no malicious code, no user input injection vectors.