pbir-cli

Pass

Audited by Gen Agent Trust Hub on Apr 25, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill makes extensive use of the pbir command-line interface to read, modify, and manage Power BI report metadata and structures.
  • Evidence: Standard operations like pbir ls, pbir tree, pbir set, and pbir validate are central to the instructions in SKILL.md and multiple reference files.
  • [EXTERNAL_DOWNLOADS]: The skill connects to official Microsoft and Fabric developer domains to download configuration schemas and allows referencing external images via URL.
  • Evidence: Download triggers in pbir schema fetch and schema references to developer.microsoft.com and powerbi.com found in report example files.
  • [PROMPT_INJECTION]: The skill processes untrusted external Power BI report files (.pbir, .pbip, .pbix), which represents a surface for indirect prompt injection.
  • Ingestion points: File reading commands like pbir cat and pbir get ingest report definitions from the project filesystem.
  • Boundary markers: Not explicitly utilized for raw data ingestion; however, the skill strongly emphasizes user confirmation and iterative verification.
  • Capability inventory: The skill can execute shell commands via the pbir CLI and perform file system writes.
  • Sanitization: Not explicitly documented for ingested JSON metadata. This is assessed as a standard low-risk surface associated with the skill's primary function of processing documents.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 25, 2026, 01:35 AM