azure-eventhub-py
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONNO_CODEEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection due to its core function of ingesting untrusted event data.\n
- Ingestion points: Untrusted external data enters the agent's context through the
event.body_as_str()method in theon_eventcallback demonstrated inSKILL.md.\n - Boundary markers: Absent. The provided examples do not use delimiters or provide instructions to the agent to treat event bodies as untrusted content.\n
- Capability inventory: The skill provides significant capabilities including sending event batches (
producer.send_batch), receiving events (consumer.receive), and retrieving Event Hub properties (get_eventhub_properties).\n - Sanitization: No sanitization, filtering, or validation logic is implemented for the data retrieved from the event stream.\n- [NO_CODE] (LOW): The skill documentation refers to implementation files that are not included in the provided bundle.\n
- Evidence:
SKILL.mdreferencesscripts/setup_consumer.pyand other documentation files in its file table, but these files are missing from the skill package.\n- [EXTERNAL_DOWNLOADS] (INFO): The skill specifies the installation of external Python dependencies.\n - Evidence:
pip installcommands forazure-eventhub,azure-identity, andazure-eventhub-checkpointstoreblob-aioare included in the installation instructions.\n - Status: Trusted. These are official packages maintained by the
microsoftorganization (downgraded per [TRUST-SCOPE-RULE]).
Recommendations
- AI detected serious security threats
Audit Metadata