azure-keyvault-secrets-rust

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOW
Full Analysis

The provided skill files (SKILL.md and references/acceptance-criteria.md) are markdown documents. They serve as documentation and provide code snippets for using the Azure Key Vault Secrets SDK for Rust. The skill itself does not contain any executable scripts or commands that the AI agent would run directly.

  1. Prompt Injection: No patterns indicative of prompt injection were found in the skill's markdown content or metadata.
  2. Data Exfiltration: The skill does not contain any commands or code snippets that would exfiltrate sensitive data to external servers. Code examples show println! for outputting secret values, which is standard for demonstration but does not constitute network exfiltration by the skill itself.
  3. Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected in the skill files.
  4. Unverifiable Dependencies: The skill instructs the user to install Rust packages using cargo add azure_security_keyvault_secrets azure_identity. These packages are hosted on crates.io (the official Rust package registry) and are part of the Azure SDK for Rust, maintained by Microsoft. Microsoft is listed as a trusted GitHub organization. Therefore, this instruction refers to a trusted external source, and the finding is informational (INFO) rather than a high-severity threat.
  5. Privilege Escalation: No commands or instructions for privilege escalation (e.g., sudo, chmod 777, service installation) were found.
  6. Persistence Mechanisms: No patterns for establishing persistence (e.g., modifying .bashrc, crontab, authorized_keys) were detected.
  7. Metadata Poisoning: The skill's metadata (name, description, package) is benign and accurately reflects the skill's purpose.
  8. Indirect Prompt Injection: This threat category is not applicable as the skill does not process external, untrusted user-supplied content in a way that could lead to indirect injection.
  9. Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were found.

Conclusion: The skill is purely instructional and references trusted external dependencies. No direct security vulnerabilities or malicious patterns were identified within the skill files themselves.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 10:25 AM