skills/datadrivenconstruction/ddc_skills_for_ai_agents_in_construction/excel-to-rvt/Gen Agent Trust Hub
excel-to-rvt
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The ExcelToRevitImporter class in SKILL.md uses the subprocess.run method to execute a local binary file named ImportExcelToRevit.exe for Revit data processing.
- [REMOTE_CODE_EXECUTION]: The DynamoScriptGenerator class generates executable Python scripts (.py) by interpolating user-provided inputs like excel_path directly into string-based code templates. This pattern is vulnerable to Python code injection if the path variable contains malicious escape characters and commands.
- [REMOTE_CODE_EXECUTION]: The skill exhibits an indirect prompt injection surface through external data processing.
- Ingestion points: The skill ingests data from Excel files using pandas.read_excel within the ExcelDataValidator and ExcelToRevitImporter classes.
- Boundary markers: No boundary markers or specific instructions are included to prevent the agent from processing instructions embedded within the Excel data.
- Capability inventory: The skill is capable of writing files to the local filesystem and executing commands through subprocesses.
- Sanitization: While json.dumps is used for parameter mappings, the excel_path variable is injected into templates without sanitization, creating a potential breakout for code execution.
Audit Metadata