azure-env-builder
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION] (LOW): Indirect prompt injection surface in
references/cicd-templates/github-actions.yml. (1) Ingestion point:github.event.inputs.environment. (2) Boundary markers: Absent. (3) Capability inventory: Executescurlin a shell environment. (4) Sanitization: Absent; the input is interpolated directly into a shell command, potentially allowing an attacker to manipulate the JSON payload sent to the Slack webhook. - [COMMAND_EXECUTION] (LOW): The script
scripts/preview_cli.ps1executes local PowerShell files based on a path constructed from theEnvironmentparameter. This provides a capability surface for executing code within specific directory structures. - [DATA_EXFILTRATION] (LOW): The
github-actions.ymltemplate contains a network operation (curl) targeting a non-whitelisted domain (Slack) for notifications. While intended for status reporting using secrets, it is a network operation to an external endpoint. - [CREDENTIALS_UNSAFE] (SAFE): No hardcoded credentials or secrets were identified in the files; all examples use standard placeholders or reference environment variables/secrets.
Audit Metadata