azure-resource-manager-cosmosdb-dotnet
Audited by Gen Agent Trust Hub on Feb 13, 2026
================================================================================
✅ VERDICT: SAFE
This skill is primarily documentation and code examples for using the Azure Resource Manager SDK for Cosmos DB in .NET. It does not contain any executable scripts or code that would run directly as part of the skill. The instructions provided are for users to set up their development environment and write their own C# code using the SDK.
Total Findings: 2
🔵 LOW Findings: • Trusted External Dependency
- SKILL.md Line 15:
dotnet add package Azure.ResourceManager.CosmosDB• Trusted External Dependency - SKILL.md Line 16:
dotnet add package Azure.Identity
ℹ️ TRUSTED SOURCE References: • https://github.com/Azure/azure-sdk-for-net/tree/main/sdk/cosmosdb/Azure.ResourceManager.CosmosDB
- references/acceptance-criteria.md Line 5: Reference to official Azure SDK GitHub repository.
================================================================================
Detailed Analysis:
-
Prompt Injection: No prompt injection patterns were detected in any of the files. The skill is instructional and code-focused, not designed to interact with an LLM in a way that would allow injection.
-
Data Exfiltration:
- The skill demonstrates how to retrieve sensitive data like Cosmos DB keys and connection strings using
Console.WriteLineinSKILL.md(Line 90) andreferences/account-management.md(Line 100). WhileConsole.WriteLineitself is not exfiltration, logging sensitive data is a security risk. However,references/acceptance-criteria.mdexplicitly includes an❌ INCORRECT: Logging Keysexample (Line 150) and a summary checklist item "Never logs or hardcodes secrets". This strong warning mitigates the risk, indicating theConsole.WriteLineexamples are for demonstrating API usage, not recommending logging. No direct exfiltration commands to untrusted external domains were found.
- The skill demonstrates how to retrieve sensitive data like Cosmos DB keys and connection strings using
-
Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected in any of the files.
-
Unverifiable Dependencies:
- The
SKILL.mdfile instructs the user to installAzure.ResourceManager.CosmosDBandAzure.Identityviadotnet add package. Both packages are official Microsoft Azure SDKs, and theazureGitHub organization is listed as a trusted source. This is noted as a LOW/INFO finding due to being a trusted external dependency. references/acceptance-criteria.mdreferences the official GitHub repositoryhttps://github.com/Azure/azure-sdk-for-net/tree/main/sdk/cosmosdb/Azure.ResourceManager.CosmosDB, which is also a trusted source.
- The
-
Privilege Escalation: No commands or instructions for privilege escalation (e.g.,
sudo,chmod 777, system file modifications) were found. -
Persistence Mechanisms: No instructions for creating persistence mechanisms (e.g., modifying shell profiles, cron jobs, systemd services) were found.
-
Metadata Poisoning: The metadata in
SKILL.md(name, description, package) is clean and accurately reflects the skill's purpose. No malicious instructions were found in any metadata fields. -
Indirect Prompt Injection: The skill does not process external, untrusted user-supplied content in a way that would lead to indirect prompt injection.
-
Time-Delayed / Conditional Attacks: No time-delayed or conditional attack patterns were detected.
Conclusion: The skill is well-documented, promotes secure coding practices, and relies on trusted external dependencies. The presence of code examples demonstrating retrieval of sensitive data is balanced by explicit warnings against logging such data. The skill itself is instructional and does not execute code, making it inherently safer.