azure-sql

Fail

Audited by Gen Agent Trust Hub on Feb 21, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
  • [CREDENTIALS_UNSAFE] (HIGH): The script hardcodes an administrative password (SecureP@ss123) for the Azure SQL server creation command. This practice exposes credentials and facilitates unauthorized access.
  • [COMMAND_EXECUTION] (LOW): The skill relies on executing az CLI commands via the shell to manage Azure resources. While this is the primary purpose of the skill, it requires the agent to have execution privileges on the host environment.
  • [SAFE] (INFO): The firewall rule configuration (0.0.0.0 to 0.0.0.0) is a standard Azure pattern to allow internal service access, though it represents a broad access policy that should be reviewed for specific environments.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 21, 2026, 07:33 PM