pbip

Pass

Audited by Gen Agent Trust Hub on Apr 25, 2026

Risk Level: SAFE
Full Analysis
  • [COMMAND_EXECUTION]: The validation script (scripts/validate_pbip.py) uses subprocess.run() to delegate report validation to the pbir CLI tool. This is implemented safely using a list of arguments and a restricted scope.
  • [EXTERNAL_DOWNLOADS]: The skill recommends installing the pbir-cli tool via uv or pip for enhanced validation. This is a standard project dependency for PBIP development.
  • [PROMPT_INJECTION]: The skill documentation identifies the Copilot/ folder, which contains markdown-based AI instructions (instructions.md). This represents a potential surface for Indirect Prompt Injection.
  • Ingestion points: Copilot/Instructions/instructions.md and VerifiedAnswers/ folders in PBIP projects.
  • Boundary markers: None explicitly mentioned for the ingestion of these specific files.
  • Capability inventory: Subprocess execution of pbir and local file write operations for project scaffolding in scripts/validate_pbip.py.
  • Sanitization: Standard path resolution and Zip Slip protection are implemented in the provided Python code snippets for archive extraction.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 25, 2026, 01:34 AM