azure-maps-search-dotnet
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill files (SKILL.md and references/acceptance-criteria.md) were thoroughly analyzed for security vulnerabilities, including prompt injection, data exfiltration, obfuscation, unverifiable dependencies, privilege escalation, persistence mechanisms, metadata poisoning, indirect prompt injection, and time-delayed attacks.
-
Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', 'Override', 'jailbreak') were found in either the skill description or the code examples.
-
Data Exfiltration: The skill demonstrates how to retrieve Azure Maps subscription keys and client IDs from environment variables (
Environment.GetEnvironmentVariable). This is a secure practice and explicitly warns against hardcoding credentials. There are no commands or code snippets that attempt to read sensitive files (e.g.,~/.ssh/id_rsa,.aws/credentials) or exfiltrate data to untrusted external domains. The saving of a map tile to a local file (./MapTile.png) is a benign local file operation. -
Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, homoglyphs, or URL/hex/HTML encoding were detected in the skill content.
-
Unverifiable Dependencies: The skill instructs users to install various
Azure.Maps.*andAzure.IdentityNuGet packages usingdotnet add package. These packages are part of the official Azure SDK for .NET, maintained by Microsoft. The GitHub repositoryhttps://github.com/Azure/azure-sdk-for-netand NuGet (https://www.nuget.org/packages/Azure.Maps.Search) are considered trusted external sources. Therefore, while external dependencies are involved, they are from highly reputable sources, and this finding is downgraded to INFO/LOW severity. The skill itself does not automatically execute these installations; it provides instructions for the user. -
Privilege Escalation: No commands or instructions that attempt to escalate privileges (e.g.,
sudo,chmod 777, service installations) were found. -
Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc,crontab,authorized_keys) were detected. -
Metadata Poisoning: The
name,description, andpackagemetadata inSKILL.mdare benign and accurately describe the skill's purpose. -
Indirect Prompt Injection: The skill processes user-provided addresses, coordinates, and IP addresses. As with any skill that handles external input, there's a theoretical risk of indirect prompt injection if the input itself is malicious. However, the skill's design and code examples do not introduce specific vulnerabilities in this regard; it's a general consideration for any data-processing application.
-
Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were identified.
Conclusion: The skill is well-documented, promotes secure coding practices (e.g., using environment variables for credentials, avoiding hardcoded secrets), and relies on official, trusted Microsoft SDKs. It primarily serves as a guide and does not contain any directly executable malicious code. The external dependencies are from trusted sources, mitigating the risk associated with package installations.