data-wrangler
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection Surface\n
- Ingestion points: The scripts
data_wrangler.pyandexcel_toolkit.pyread data from potentially untrusted external sources, including CSV, Excel, JSON, and Parquet files.\n - Boundary markers: The skill does not employ specific delimiters or instruction-isolation techniques when processing data from these files.\n
- Capability inventory: The skill possesses capabilities for file system writes, directory creation, and dynamic string evaluation, which could be exploited if malicious data influences the agent's logic.\n
- Sanitization: While filename sanitization is present in the
splitoperation, there is no comprehensive sanitization of data content before it is used in expression evaluation.\n- [COMMAND_EXECUTION]: Dynamic Evaluation of Expressions\n - The
data_wrangler.pyscript utilizespandas.DataFrame.eval()andpandas.DataFrame.query()for core features like filtering, computed columns, and row dropping. These methods evaluate string-based expressions at runtime.\n - The
queryoperation indata_wrangler.pysupports SQL execution via thepandasqllibrary, which involves dynamic translation and execution of SQL against local DataFrames.
Audit Metadata