excel-reader
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes untrusted Excel data which could contain malicious instructions designed to influence the agent's behavior (indirect prompt injection).
- Ingestion points: The
packages/excel-reader/main.pyscript reads and extracts data from external.xlsxand.xlsmfiles. - Boundary markers: Absent. The output format does not wrap extracted data in delimiters to prevent the agent from misinterpreting it as commands.
- Capability inventory: The skill utilizes file system access to read spreadsheets and executes code via Python and the
openpyxllibrary. - Sanitization: The implementation uses
data_only=Trueto retrieve calculated values rather than original formulas, which helps mitigate risks from malicious Excel formulas. - [EXTERNAL_DOWNLOADS]: The skill configuration specifies downloading Python packages from an external mirror.
- Evidence:
packages/excel-reader/pyproject.tomlsets the package index tohttps://mirrors.aliyun.com/pypi/simple/(Aliyun mirror). - [EXTERNAL_DOWNLOADS]: The skill scripts provide instructions to download and install the
uvdependency manager from the official Astral website if it is not already installed on the system. - [COMMAND_EXECUTION]: The automation scripts execute shell commands to manage dependencies and launch the Python reader.
- Evidence: The bash and PowerShell scripts in the
scripts/directory calluv syncanduv runto perform their tasks.
Audit Metadata