azure-mgmt-fabric-py
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill consists of two markdown files: SKILL.md and references/acceptance-criteria.md.
SKILL.md Analysis:
- Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', role-play instructions) were found.
- Data Exfiltration: The skill uses
os.environto retrieve Azure subscription and resource group IDs, which is a standard and secure practice. It then uses theazure-mgmt-fabricSDK to interact with Azure APIs. These network operations are legitimate and target trusted Microsoft domains. No access to sensitive local files (e.g.,~/.ssh/id_rsa) or exfiltration to untrusted external domains was detected. - Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were found.
- Unverifiable Dependencies: The skill instructs
pip install azure-mgmt-fabricandpip install azure-identity. Bothazure-mgmt-fabricandazure-identityare official Azure SDK packages maintained by Microsoft, which is a trusted GitHub organization (Azureon GitHub). This is noted as a LOW/INFO finding due to being a trusted external source. - Privilege Escalation: No commands like
sudo,chmod +x, or modifications to system files were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs) were detected. - Metadata Poisoning: The skill's metadata (name, description) is benign and accurately reflects its purpose.
- Indirect Prompt Injection: The skill interacts with external APIs (Azure). While any interaction with external data carries an inherent, general risk of indirect prompt injection if the external data itself is malicious, the skill's code does not introduce specific vulnerabilities in this regard. This is an INFO-level general risk for skills processing external content.
- Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were found.
references/acceptance-criteria.md Analysis:
This file serves as a reference document for validating generated code and does not contain executable instructions for the agent. It reinforces secure practices, such as avoiding hardcoded credentials and using DefaultAzureCredential. It explicitly references https://github.com/Azure/azure-sdk-for-python as the repository for the SDK, confirming the trusted source for dependencies.
Conclusion: The skill is well-structured, uses official and trusted libraries, and follows recommended security practices for interacting with Azure. The only external dependencies are from Microsoft, which are considered trusted sources. Therefore, the overall risk is minimal.