azure-cosmos-db-py
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill azure-cosmos-db-py and its associated files (SKILL.md, assets/.py, references/.md) were thoroughly analyzed for potential security threats. The analysis focused on prompt injection, data exfiltration, obfuscation, unverifiable dependencies, privilege escalation, persistence mechanisms, metadata poisoning, indirect prompt injection, and time-delayed attacks.
1. Prompt Injection: No patterns indicative of prompt injection were found. The skill explicitly advocates for parameterized queries (e.g., in references/acceptance-criteria.md and references/service-layer.md), which is a strong defense against SQL injection, a common form of prompt injection in database contexts.
2. Data Exfiltration: No commands or patterns were detected that would exfiltrate sensitive user data to external, untrusted servers. The skill discusses handling COSMOS_KEY for local emulator use but explicitly warns against using it in production, instead recommending DefaultAzureCredential for RBAC. This demonstrates a strong commitment to preventing credential misuse.
3. Obfuscation: No obfuscated content (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) was found in any of the provided files.
4. Unverifiable Dependencies: The SKILL.md and references/client-setup.md instruct users to pip install azure-cosmos azure-identity and pydantic_settings. These packages are part of the official Azure SDK for Python and Pydantic, respectively, and are maintained by trusted organizations (azure, pydantic). Similarly, testing dependencies like pytest and unittest.mock are standard and trusted. References to https://github.com/Azure/azure-sdk-for-python are also to a trusted GitHub organization. Therefore, these external dependencies are considered low risk.
5. Privilege Escalation: No commands or instructions for privilege escalation (e.g., sudo, chmod 777, service installation) were found.
6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying shell profiles, creating cron jobs, or systemd services) were detected.
7. Metadata Poisoning: The skill's metadata (name, description) and internal documentation (READMEs, comments) were clean and did not contain any hidden malicious instructions.
8. Indirect Prompt Injection: The skill does not process arbitrary external content in a way that would make it susceptible to indirect prompt injection. It focuses on database interaction and application logic.
9. Time-Delayed / Conditional Attacks: No conditional logic was found that would trigger malicious behavior based on time, usage, or specific environmental factors.
Conclusion: The skill is well-designed with a strong focus on security best practices for Azure Cosmos DB development. The code examples and documentation consistently promote secure patterns, particularly in authentication and query handling. The external dependencies are from trusted sources and are used appropriately. Therefore, the skill is deemed SAFE.