excel-to-rvt

Warn

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The ExcelToRevitImporter class in SKILL.md uses the subprocess.run method to execute a local binary file named ImportExcelToRevit.exe for Revit data processing.
  • [REMOTE_CODE_EXECUTION]: The DynamoScriptGenerator class generates executable Python scripts (.py) by interpolating user-provided inputs like excel_path directly into string-based code templates. This pattern is vulnerable to Python code injection if the path variable contains malicious escape characters and commands.
  • [REMOTE_CODE_EXECUTION]: The skill exhibits an indirect prompt injection surface through external data processing.
  • Ingestion points: The skill ingests data from Excel files using pandas.read_excel within the ExcelDataValidator and ExcelToRevitImporter classes.
  • Boundary markers: No boundary markers or specific instructions are included to prevent the agent from processing instructions embedded within the Excel data.
  • Capability inventory: The skill is capable of writing files to the local filesystem and executing commands through subprocesses.
  • Sanitization: While json.dumps is used for parameter mappings, the excel_path variable is injected into templates without sanitization, creating a potential breakout for code execution.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 5, 2026, 04:28 AM