azure-mgmt-arizeaiobservabilityeval-dotnet
Pass
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists of two Markdown files: SKILL.md and references/acceptance-criteria.md. Both files are purely descriptive and contain C# code snippets for demonstration purposes, not for execution by the AI agent.
- Prompt Injection: No patterns indicative of prompt injection were found in either file. The language is instructional and technical.
- Data Exfiltration: The skill describes the use of environment variables for Azure credentials (
AZURE_SUBSCRIPTION_ID,AZURE_TENANT_ID,AZURE_CLIENT_ID,AZURE_CLIENT_SECRET), which are sensitive. However, the skill only references these variables as input for the SDK and does not contain any code to read, process, or exfiltrate them. No network operations to non-whitelisted domains or sensitive file access were detected. - Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected in either file.
- Unverifiable Dependencies: The
SKILL.mdfile instructs users to installAzure.ResourceManager.ArizeAIObservabilityEvalviadotnet add packageand lists its dependencies (Azure.Core,Azure.ResourceManager). It also links to the NuGet package and theAzure/azure-sdk-for-netGitHub repository. Thereferences/acceptance-criteria.mdfile also references the same GitHub and NuGet sources. These are all recognized as Trusted External Sources (Microsoft/Azure organizations). As such, this finding is downgraded to LOW/INFO severity, as it's a standard and trusted dependency reference, not an unverified or malicious one. - Privilege Escalation: No commands or instructions for privilege escalation (
sudo,chmod, service installation, etc.) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying shell profiles, cron jobs, systemd services) were detected.
- Metadata Poisoning: The
nameanddescriptionfields inSKILL.mdare benign and accurately reflect the skill's purpose. - Indirect Prompt Injection: The skill does not process external user-supplied content, so it is not susceptible to indirect prompt injection.
- Time-Delayed / Conditional Attacks: No conditional logic that would trigger malicious behavior based on time, usage, or environment was found.
Conclusion: The skill is purely informational, describing the usage of a legitimate Azure SDK. The external dependencies are from trusted sources. There are no executable components for the AI agent, and no malicious patterns were identified.
Audit Metadata