azure-keyvault-keys-rust
Audited by Gen Agent Trust Hub on Feb 13, 2026
================================================================================
🔵 VERDICT: LOW
This skill is generally safe, providing documentation and code examples for using the Azure Key Vault Keys Rust SDK. The primary security consideration is the installation of external Rust packages (azure_security_keyvault_keys and azure_identity) via cargo add. While these are from a trusted source (Azure SDK for Rust), any external dependency introduces a supply chain risk. The skill also requires an AZURE_KEYVAULT_URL environment variable, which is standard practice for cloud SDKs and not inherently malicious.
Total Findings: 2
🔵 LOW Findings: • Unverifiable Dependency
- SKILL.md Line 10:
cargo add azure_security_keyvault_keys azure_identity• Unverifiable Dependency - references/acceptance-criteria.md Line 4:
Crate: azure_security_keyvault_keys
ℹ️ TRUSTED SOURCE References: • https://github.com/Azure/azure-sdk-for-rust/tree/main/sdk/keyvault/azure_security_keyvault_keys
- SKILL.md Line 80: Source code for the Rust SDK is referenced from a trusted GitHub organization (Azure). • https://crates.io/crates/azure_security_keyvault_keys
- SKILL.md Line 81: Rust package registry reference for the SDK, which is a trusted source for Rust packages.
================================================================================