excel-to-csv
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface as its primary purpose is processing untrusted Excel data which is then read into the agent's context.
- Ingestion points: Data from untrusted .xlsx or .xls files is processed by
scripts/convert.pyand the resulting CSV output is read into the agent's context as described inSKILL.md(Phase 3). - Boundary markers: The instructions do not define specific delimiters or directives for the agent to ignore potentially malicious instructions embedded within the cell contents of the processed data.
- Capability inventory: The agent is granted
Bash,Read, andWritepermissions, and is explicitly directed to use tools likeawkandsedto repair CSV files based on structural error logs (SKILL.md, Phase 2). - Sanitization: While
scripts/verify_csv.pyperforms structural linting for jagged rows and empty files, it does not validate or sanitize the textual content of the data for safety. - [SAFE]: The 'Tainted Context Cleanser' rule in
SKILL.mdprovides a mitigation against context-filling attacks by limiting the volume of data the agent can read at once (truncating to 50 lines). - [SAFE]: The
convert.pyscript implements asanitize_sheet_namefunction that prevents path traversal vulnerabilities by filtering illegal characters from sheet names used in file creation.
Audit Metadata