docs-pbix
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script requires the
pbixrayPython package (>=0.1.0) from PyPI, which is an external dependency not included in the trusted vendors list.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection and path traversal when processing malicious Power BI files.\n - Ingestion points: Power BI files (.pbix) provided to the
scripts/parse_pbix.pyscript via command-line arguments.\n - Boundary markers: No delimiters or instructions are used to separate extracted DAX expressions or model metadata from agent instructions.\n
- Capability inventory: The script performs extensive file system operations including directory creation (
mkdir) and file writing viajson.dump,pandas.to_csv, andzipfile.extractall.\n - Sanitization: The
zip_ref.extractall()call inscripts/parse_pbix.pydoes not validate file paths within the archive, allowing a malicious PBIX file to perform path traversal (Zip Slip) and potentially overwrite arbitrary files on the system.
Audit Metadata