azure-identity-dotnet

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOWNO_CODE
Full Analysis

The analysis of 'SKILL.md' and 'references/acceptance-criteria.md' reveals that both files are instructional and informational. They contain C# and bash code snippets that are examples for user implementation, not commands for the AI agent to execute directly.

Threat Category Review:

  1. Prompt Injection: No patterns indicative of prompt injection were found in either file or their metadata.
  2. Data Exfiltration: The skill describes how to configure sensitive environment variables (e.g., AZURE_CLIENT_SECRET) but does not contain any commands to read, access, or exfiltrate this data. It explicitly warns against hardcoding secrets in its anti-patterns.
  3. Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, etc.) were detected.
  4. Unverifiable Dependencies: The skill instructs users to install NuGet packages via dotnet add package Azure.Identity, Microsoft.Extensions.Azure, and Azure.Identity.Broker. These packages are official Microsoft releases and are considered trusted external sources. Similarly, the GitHub repository reference (https://github.com/Azure/azure-sdk-for-net) is also from a trusted organization (Azure). According to the protocol, findings related to downloads/references from trusted external sources are downgraded to LOW/INFO severity. However, since these are instructions for the user and not direct agent execution, and the skill itself is a knowledge base, it does not elevate the overall risk for the agent.
  5. Privilege Escalation: No commands for privilege escalation (e.g., sudo, chmod 777, service installation) were found.
  6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying .bashrc, crontab) were detected.
  7. Metadata Poisoning: The metadata fields (name, description, package) are clean and accurately describe the skill's purpose.
  8. Indirect Prompt Injection: The skill does not process external user-supplied content, so this threat is not applicable.
  9. Time-Delayed / Conditional Attacks: No conditional logic designed to trigger malicious behavior based on time, usage, or environment was found.

Conclusion: The skill is a safe, informational resource. The presence of dotnet add package instructions and references to a trusted GitHub repository are noted but do not pose a security risk to the agent or the user beyond standard software dependency considerations from trusted sources.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 10:25 AM