skills/syncfusion/spreadsheet-editor-sdk-skills/syncfusion-winforms-spreadsheet-editor/Gen Agent Trust Hub
syncfusion-winforms-spreadsheet-editor
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it is designed to ingest and process data from external Excel workbooks and existing project source code.
- Ingestion points: The agent accesses data via the
spreadsheet.Open()methods described inreferences/getting-started.mdand the file modification workflow defined inSKILL.md. - Boundary markers: The skill does not provide the agent with explicit instructions or delimiters to ignore potential commands embedded within the workbooks or project files it reads.
- Capability inventory: The skill facilitates file system write access (Step 4 in
SKILL.md) and provides code snippets for shell-level execution usingSystem.Diagnostics.Process.Start. - Sanitization: There is no evidence of sanitization or validation of content extracted from user-provided files before it is used to influence the agent's logic or code generation.
- [DATA_EXFILTRATION]: The skill's operational workflow in
SKILL.mdgrants the agent the capability to read, append to, or overwrite arbitrary files in the user's workspace (e.g., project source files, configuration files). Although the skill requires a confirmation step, this capability creates a high-risk surface for unauthorized data access or modification if the agent's context is compromised. - [COMMAND_EXECUTION]: The skill provides C# code templates in
references/conversion.mdthat utilizeSystem.Diagnostics.Process.Start()to open generated files like PDFs, images, and HTML. This practice introduces a risk where untrusted file names or paths could be used to execute unintended shell commands on the user's system.
Audit Metadata