pbir-cli
Pass
Audited by Gen Agent Trust Hub on Apr 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill makes extensive use of the
pbircommand-line interface to read, modify, and manage Power BI report metadata and structures. - Evidence: Standard operations like
pbir ls,pbir tree,pbir set, andpbir validateare central to the instructions in SKILL.md and multiple reference files. - [EXTERNAL_DOWNLOADS]: The skill connects to official Microsoft and Fabric developer domains to download configuration schemas and allows referencing external images via URL.
- Evidence: Download triggers in
pbir schema fetchand schema references todeveloper.microsoft.comandpowerbi.comfound in report example files. - [PROMPT_INJECTION]: The skill processes untrusted external Power BI report files (.pbir, .pbip, .pbix), which represents a surface for indirect prompt injection.
- Ingestion points: File reading commands like
pbir catandpbir getingest report definitions from the project filesystem. - Boundary markers: Not explicitly utilized for raw data ingestion; however, the skill strongly emphasizes user confirmation and iterative verification.
- Capability inventory: The skill can execute shell commands via the
pbirCLI and perform file system writes. - Sanitization: Not explicitly documented for ingested JSON metadata. This is assessed as a standard low-risk surface associated with the skill's primary function of processing documents.
Audit Metadata