adf-ml-analytics

Pass

Audited by Gen Agent Trust Hub on Mar 8, 2026

Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
  • [PROMPT_INJECTION]: The skill defines patterns for ingesting and processing untrusted data from external sources (e.g., feedback text, database records) for analysis by AI services or LLMs, which constitutes an indirect prompt injection surface.\n
  • Ingestion points: LookupFeedback activity, GetRecordBatches activity, and various SQL lookup activities in SKILL.md.\n
  • Boundary markers: The templates do not include explicit delimiters or instructions to ignore embedded commands in the processed data.\n
  • Capability inventory: The skill can perform network requests via WebActivity, write data via Copy activities, and execute logic via DatabricksJob and SqlServerStoredProcedure.\n
  • Sanitization: No sanitization or validation logic is present in the orchestration templates for the external text data.\n- [COMMAND_EXECUTION]: The skill includes patterns for executing arbitrary Python or R scripts and deserializing data within the database engine, representing high-privilege operations within the SQL context.\n
  • Evidence: Implementation of the dbo.usp_PythonMLScoring procedure in SKILL.md uses the sp_execute_external_script feature with the @language = N'Python' parameter.\n
  • Evidence: The embedded Python script utilizes pickle.loads() to deserialize model data retrieved from the dbo.MLModels table, which is a potential vector for unsafe deserialization if the database content is compromised.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 8, 2026, 11:50 PM