azure-servicebus-dotnet

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOWNO_CODE
Full Analysis
  1. Prompt Injection: No prompt injection patterns (e.g., 'IMPORTANT: Ignore', 'You are now unrestricted') were detected in either the SKILL.md or acceptance-criteria.md files. The content is purely instructional and code-focused.
  2. Data Exfiltration: No commands or code snippets attempt to read sensitive files (e.g., ~/.aws/credentials, ~/.ssh/id_rsa) or send data to non-whitelisted external domains. The network operations mentioned are for installing official .NET packages from NuGet.org and referencing documentation/source code on trusted Microsoft/Azure GitHub repositories and learn.microsoft.com.
  3. Obfuscation: No obfuscation techniques such as Base64 encoding, zero-width characters, Unicode homoglyphs, URL encoding, hex escapes, or HTML entities were found in the skill content.
  4. Unverifiable Dependencies: The skill instructs users to install Azure.Messaging.ServiceBus and Azure.Identity using dotnet add package. These are official Microsoft Azure SDK packages, hosted on NuGet.org, and their source code is maintained under the trusted Azure GitHub organization. As such, these dependencies are considered trusted external sources, and this finding is downgraded to INFO.
  5. Privilege Escalation: No commands or instructions attempt to escalate privileges (e.g., sudo, chmod +x, chmod 777, service installations).
  6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying shell profiles like .bashrc, creating cron jobs, or configuring systemd services) were detected.
  7. Metadata Poisoning: The skill's metadata (name, description) and internal comments are benign and accurately reflect its purpose. No malicious instructions were found embedded in these fields.
  8. Indirect Prompt Injection: The skill itself does not process external user-supplied data. While the applications built using the SDK might process such data, the skill's instructions do not introduce this vulnerability directly.
  9. Time-Delayed / Conditional Attacks: No conditional logic based on time, usage counters, version checks, or environment variables was found that could trigger malicious behavior.

Adversarial Reasoning: The skill is transparent, well-documented, and focuses on providing correct and secure usage patterns for the Azure Service Bus SDK. It explicitly advises against insecure practices like hardcoding connection strings. No sophisticated evasion techniques or hidden malicious intent were identified. The content is consistent with its stated purpose.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 10:26 AM