azure-mgmt-apimanagement-py
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill SKILL.md and its accompanying references/acceptance-criteria.md were thoroughly analyzed for security vulnerabilities. No critical or high-severity threats were identified.
-
Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', role-play instructions) were found in any of the files or metadata.
-
Data Exfiltration: No attempts to exfiltrate sensitive data were detected. The skill correctly uses
os.environ["AZURE_SUBSCRIPTION_ID"]for accessing credentials, which is a secure practice. A network call tohttps://petstore.swagger.io/v2/swagger.jsonis present (SKILL.md, Line 66), but this is a well-known, benign example API for OpenAPI specifications and does not pose a security risk. -
Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were found.
-
Unverifiable Dependencies: The skill instructs the user to install
azure-mgmt-apimanagementandazure-identityviapip install(SKILL.md, Lines 11-12). These are official Azure SDKs, maintained by Microsoft, which is a trusted organization. Thereferences/acceptance-criteria.mdalso referenceshttps://github.com/Azure/azure-sdk-for-python(Line 4), which is a trusted GitHub repository. These external dependencies are considered low risk due to their trusted source. -
Privilege Escalation: No commands or code snippets attempting privilege escalation (e.g.,
sudo,chmod 777, service installations) were found. -
Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc,crontab,authorized_keys) were detected. -
Metadata Poisoning: The skill's metadata fields (
name,description,package) are benign and do not contain any malicious instructions. -
Indirect Prompt Injection: The skill does not process external, untrusted user input in a way that would make it susceptible to indirect prompt injection.
-
Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were found.
Hardcoded Credentials: The skill explicitly demonstrates the use of environment variables for AZURE_SUBSCRIPTION_ID and shows how to securely store secrets within Azure API Management using named values (secret=True). The acceptance-criteria.md file also correctly identifies and warns against hardcoding credentials as an anti-pattern.
Conclusion: The skill adheres to secure coding practices and relies on trusted, official libraries. The external downloads are from reputable sources, and no other security concerns were identified. The skill is deemed safe.