docs-pbix

Warn

Audited by Gen Agent Trust Hub on Mar 2, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The script requires the pbixray Python package (>=0.1.0) from PyPI, which is an external dependency not included in the trusted vendors list.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection and path traversal when processing malicious Power BI files.\n
  • Ingestion points: Power BI files (.pbix) provided to the scripts/parse_pbix.py script via command-line arguments.\n
  • Boundary markers: No delimiters or instructions are used to separate extracted DAX expressions or model metadata from agent instructions.\n
  • Capability inventory: The script performs extensive file system operations including directory creation (mkdir) and file writing via json.dump, pandas.to_csv, and zipfile.extractall.\n
  • Sanitization: The zip_ref.extractall() call in scripts/parse_pbix.py does not validate file paths within the archive, allowing a malicious PBIX file to perform path traversal (Zip Slip) and potentially overwrite arbitrary files on the system.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 2, 2026, 11:02 AM