azure-drift-detector
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/accept-drift.shcontains a command injection vulnerability where user-provided input is interpolated into a shell heredoc. The--reasonargument (or interactivereadinput) is placed directly into a double-quoted heredoc (cat >> ... <<EOF), which allows the shell to evaluate command substitutions like$(...)if they are included in the reason string. - [COMMAND_EXECUTION]: Multiple scripts (
detect-drift.sh,accept-drift.sh,drift-check-all.sh) use unsafe word splitting inforloops when iterating over resource IDs, names, or tag keys obtained fromjq. If these identifiers contain spaces or shell metacharacters, it can lead to unexpected command execution or script failure. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it ingests untrusted data from Azure resource properties and interpolates it into markdown reports and logs without sanitization. (Evidence Chain: Ingestion points: Azure resource properties fetched via
az resource showinscripts/detect-drift.sh; Boundary markers: Absent; Capability inventory: Cloud resource modification viaaz deployment group createand file system writes; Sanitization: None identified; data is extracted viajqand directly embedded into output files).
Audit Metadata