azure-pipelines-validator
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The orchestration scripts
scripts/python_wrapper.shandscripts/yamllint_check.share designed to automatically install thepyyamlandyamllintpackages from the official Python Package Index (PyPI) if they are missing. This is implemented using standard virtual environment management to ensure the tool functions correctly across different environments without manual setup. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because its core functionality involves parsing and reporting on untrusted external data (Azure Pipeline YAML files).
- Ingestion points: User-provided files are read by the scripts
scripts/validate_syntax.py,scripts/check_best_practices.py, andscripts/check_security.py. - Boundary markers: The skill does not currently implement specific delimiters or 'ignore instructions' warnings when outputting the results of the YAML analysis to the agent.
- Capability inventory: The skill utilizes shell commands (
find,bash) and Python logic for static analysis. It does not provide a mechanism to execute the content of the analyzed pipeline files. - Sanitization: The tool uses
yaml.safe_loadfor processing input, which is a security best practice that prevents the deserialization of arbitrary Python objects.
Audit Metadata