syncfusion-winforms-spreadsheet-editor

Pass

Audited by Gen Agent Trust Hub on Apr 1, 2026

Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it is designed to ingest and process data from external Excel workbooks and existing project source code.
  • Ingestion points: The agent accesses data via the spreadsheet.Open() methods described in references/getting-started.md and the file modification workflow defined in SKILL.md.
  • Boundary markers: The skill does not provide the agent with explicit instructions or delimiters to ignore potential commands embedded within the workbooks or project files it reads.
  • Capability inventory: The skill facilitates file system write access (Step 4 in SKILL.md) and provides code snippets for shell-level execution using System.Diagnostics.Process.Start.
  • Sanitization: There is no evidence of sanitization or validation of content extracted from user-provided files before it is used to influence the agent's logic or code generation.
  • [DATA_EXFILTRATION]: The skill's operational workflow in SKILL.md grants the agent the capability to read, append to, or overwrite arbitrary files in the user's workspace (e.g., project source files, configuration files). Although the skill requires a confirmation step, this capability creates a high-risk surface for unauthorized data access or modification if the agent's context is compromised.
  • [COMMAND_EXECUTION]: The skill provides C# code templates in references/conversion.md that utilize System.Diagnostics.Process.Start() to open generated files like PDFs, images, and HTML. This practice introduces a risk where untrusted file names or paths could be used to execute unintended shell commands on the user's system.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 1, 2026, 06:47 AM