azure-security-keyvault-secrets-java
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill consists of documentation and code examples for the Azure Key Vault Secrets Java SDK. All files (SKILL.md, references/acceptance-criteria.md, references/examples.md) were thoroughly analyzed for security vulnerabilities.
-
Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', role-play instructions, system prompt extraction) were found in any of the files. The content is purely instructional and descriptive.
-
Data Exfiltration: The skill demonstrates how to retrieve and print secret values to standard output (
System.out.println) and how to perform local file operations for secret backup and restore (Files.write,Files.readAllBytes). While printing sensitive data to stdout or writing to local files can be vectors for data exfiltration in a real application, in the context of this skill, these are demonstrations of the SDK's intended functionality for secret management. The skill does not instruct to send this data to any untrusted external servers or to write to sensitive system locations. The skill also includes a 'Best Practices' section that encourages secure handling of secrets. -
Obfuscation: No obfuscation techniques (Base64, zero-width characters, Unicode homoglyphs, URL/hex/HTML encoding) were detected in any of the files.
-
Unverifiable Dependencies: The skill references
com.azure:azure-security-keyvault-secretsandcom.azure:azure-identityas dependencies. These are official Azure SDK components, and the associated GitHub repository (https://github.com/Azure/azure-sdk-for-java) is a trusted source (under theazureorganization). Therefore, these dependencies are considered safe and do not pose a risk of unverifiable code execution. -
Privilege Escalation: No commands or instructions that attempt to escalate privileges (e.g.,
sudo,chmod 777, service installations) were found. -
Persistence Mechanisms: No instructions to establish persistence (e.g., modifying
.bashrc, creating cron jobs, or systemd services) were found. -
Metadata Poisoning: The metadata fields (name, description) are benign and accurately reflect the skill's purpose.
-
Indirect Prompt Injection: The skill does not process arbitrary external content (like emails or web pages) that could be used for indirect prompt injection.
-
Time-Delayed / Conditional Attacks: No conditional logic based on time, usage, or environment variables designed to trigger malicious behavior was found.
Conclusion: The skill is a well-documented guide for using a legitimate security SDK. It adheres to best practices and does not exhibit any malicious patterns. The skill is fully contained in natural language description and does not require any code, scripts, or external resources to be executed or downloaded beyond standard Java dependencies from trusted sources.