csv-pipeline

Pass

Audited by Gen Agent Trust Hub on Apr 14, 2026

Risk Level: SAFE
Full Analysis
  • [SAFE]: No malicious patterns, obfuscation, or security risks were identified in the skill instructions or the Python script.
  • [DATA_EXFILTRATION]: The script reads and writes to user-specified file paths but does not access sensitive system directories (like .ssh or .aws) or perform network operations.
  • [REMOTE_CODE_EXECUTION]: No remote code execution or dynamic code execution patterns (such as eval, exec, or subprocess calls) were detected in the source code.
  • [EXTERNAL_DOWNLOADS]: The skill has no external dependencies and does not download any content from the internet during execution.
  • [PROMPT_INJECTION]: 1. Ingestion points: The script reads external data files in CSV, TSV, and JSON formats in scripts/csv_tool.py. 2. Boundary markers: Absent. 3. Capability inventory: No subprocess calls, network operations, or dangerous file system access detected across all scripts. 4. Sanitization: The cmd_clean function provides basic whitespace and value normalization, though no specific injection-prevention sanitization is performed.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 14, 2026, 09:20 AM