csv-processor
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Data Exposure & Exfiltration] (HIGH): The script allows reading and writing to arbitrary file paths provided via CLI arguments (
fileand--output). - Evidence: In
scripts/csv_processor.py, theread_csvandwrite_csvfunctions pass the user-controlledfilepathdirectly to Python'sopen()function without validation or sandboxing. This allows an attacker to read sensitive files (e.g.,/etc/passwd,~/.ssh/id_rsa) or overwrite critical system files if the agent has sufficient permissions. - [Indirect Prompt Injection] (HIGH): The skill processes external CSV data which acts as a primary vector for indirect prompt injection attacks.
- Ingestion points:
read_csvinscripts/csv_processor.pyreads data from any local file. - Boundary markers: Absent. The data is parsed and printed directly to the agent's context.
- Capability inventory: File read, file write, and data display capabilities.
- Sanitization: Absent. There is no filtering or escaping of content within the CSV rows that might contain malicious instructions for the LLM.
- [Metadata Poisoning] (MEDIUM): The
SKILL.mdfrontmatter claims the source repository ispandas-dev/pandasand the docstring inscripts/csv_processor.pysuggestspip install pandas. However, the script is a standalone implementation using only the standardcsvlibrary and does not import or utilizepandasat all. This is misleading and could lead to incorrect assumptions about the code's provenance and security properties. - [Denial of Service] (LOW): The
filtercommand includes a--regexoption that uses theremodule on user-supplied patterns. - Evidence:
re.search(args.value, value)incmd_filter. This is vulnerable to Regular Expression Denial of Service (ReDoS) if a malicious regex is provided via the command line, potentially hanging the agent's execution environment.
Recommendations
- AI detected serious security threats
Audit Metadata