azure-mgmt-applicationinsights-dotnet
Pass
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists of two markdown files: SKILL.md and references/acceptance-criteria.md. Both files primarily contain documentation, C# code snippets, and references to official Microsoft Azure SDKs and NuGet packages.
- Prompt Injection: No patterns indicative of prompt injection attempts were found. The language is purely instructional and technical.
- Data Exfiltration: No direct data exfiltration was detected. While the code snippets show printing sensitive information like
InstrumentationKeyandAPI Keyto the console, this is part of the intended functionality for managing these resources and is not being sent to an untrusted external server. The skill also explicitly recommends storing connection strings securely using Key Vault or managed identity. - Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, etc.) were found in either file.
- Unverifiable Dependencies: The skill references
dotnet add package Azure.ResourceManager.ApplicationInsightsanddotnet add package Azure.Identity. These packages are from theAzure(Microsoft) organization, which is on the list of trusted external sources. The NuGet and GitHub links provided also point to official Microsoft resources. This is noted as an informational finding but does not elevate the overall risk. - Privilege Escalation: No commands or instructions for privilege escalation (e.g.,
sudo,chmod 777, modifying system files) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs) were detected. - Metadata Poisoning: The metadata fields (
name,description,package) inSKILL.mdare clean and accurately describe the skill's purpose. - Indirect Prompt Injection: The skill's primary function is to provide code examples for interacting with Azure APIs, not to process arbitrary external user content, thus the risk of indirect prompt injection is not directly applicable to the skill's own operation.
- Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were identified.
Overall, the skill is a well-structured documentation and example set for using a trusted SDK. It does not contain any executable components that could be directly exploited, and its dependencies are from trusted sources.
Audit Metadata