dwg-to-excel

Pass

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The Python integration in SKILL.md uses subprocess.run to invoke a local executable named DwgExporter.exe. This command execution is the primary mechanism for the skill's file conversion functionality.
  • [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface by extracting and processing text-based entities (TEXT, MTEXT, and ATTRIB) from untrusted DWG files provided by users.
  • Ingestion points: Data is read from the generated Excel file using the read_entities and get_text_content methods in SKILL.md.
  • Boundary markers: The skill does not implement delimiters or 'ignore' instructions for the extracted CAD text content.
  • Capability inventory: The skill uses subprocess.run for binary execution and has filesystem permissions as defined in claw.json.
  • Sanitization: There is no explicit sanitization or validation of the text content extracted from the DWG entities before processing.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 5, 2026, 04:27 AM