azure-security-keyvault-secrets-java

Pass

Audited by Gen Agent Trust Hub on Mar 1, 2026

Risk Level: SAFECREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The documentation and code examples in SKILL.md and references/acceptance-criteria.md contain hardcoded placeholder credentials such as "P@ssw0rd123!" and "sk_live_abc123xyz" which match patterns for sensitive information.
  • [EXTERNAL_DOWNLOADS]: The skill declares dependencies on official Azure SDK libraries com.azure:azure-security-keyvault-secrets and com.azure:azure-identity, which originate from a trusted organization.
  • [DATA_EXFILTRATION]: The skill includes functionality to read secrets from Azure Key Vault and write them to the local filesystem for backup purposes, which involves both network and file system access consistent with the skill's purpose.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection from data retrieved from the external vault. 1. Ingestion points: Secrets are ingested via secretClient.getSecret() and secretClient.listPropertiesOfSecrets() as described in SKILL.md. 2. Boundary markers: No explicit delimiters or instructions to ignore embedded commands within secret values are provided in the examples. 3. Capability inventory: The skill enables network communication with Azure endpoints and local file writing via Files.write(). 4. Sanitization: No evidence of content validation or sanitization of retrieved secrets is present in the provided examples.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 1, 2026, 12:35 AM