azure-mgmt-applicationinsights-dotnet

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOWNO_CODE
Full Analysis

The skill consists of two markdown files: SKILL.md and references/acceptance-criteria.md. Both files primarily contain documentation, C# code snippets, and references to official Microsoft Azure SDKs and NuGet packages.

  1. Prompt Injection: No patterns indicative of prompt injection attempts were found. The language is purely instructional and technical.
  2. Data Exfiltration: No direct data exfiltration was detected. While the code snippets show printing sensitive information like InstrumentationKey and API Key to the console, this is part of the intended functionality for managing these resources and is not being sent to an untrusted external server. The skill also explicitly recommends storing connection strings securely using Key Vault or managed identity.
  3. Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, etc.) were found in either file.
  4. Unverifiable Dependencies: The skill references dotnet add package Azure.ResourceManager.ApplicationInsights and dotnet add package Azure.Identity. These packages are from the Azure (Microsoft) organization, which is on the list of trusted external sources. The NuGet and GitHub links provided also point to official Microsoft resources. This is noted as an informational finding but does not elevate the overall risk.
  5. Privilege Escalation: No commands or instructions for privilege escalation (e.g., sudo, chmod 777, modifying system files) were found.
  6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying .bashrc, creating cron jobs) were detected.
  7. Metadata Poisoning: The metadata fields (name, description, package) in SKILL.md are clean and accurately describe the skill's purpose.
  8. Indirect Prompt Injection: The skill's primary function is to provide code examples for interacting with Azure APIs, not to process arbitrary external user content, thus the risk of indirect prompt injection is not directly applicable to the skill's own operation.
  9. Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were identified.

Overall, the skill is a well-structured documentation and example set for using a trusted SDK. It does not contain any executable components that could be directly exploited, and its dependencies are from trusted sources.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 10:25 AM