azure-storage-blob-py
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill SKILL.md and its accompanying references/acceptance-criteria.md provide comprehensive documentation and code examples for interacting with Azure Blob Storage using Python. The analysis found the following:
-
Prompt Injection: No patterns indicative of prompt injection were found in either file. The language is instructional and does not attempt to override the agent's behavior or bypass safety guidelines.
-
Data Exfiltration: The skill's core purpose is to facilitate data transfer (upload/download) to and from Azure Blob Storage. The examples provided use local files (
./local-file.txt,./downloaded.txt) and do not reference sensitive system files (e.g.,~/.ssh/id_rsa,~/.aws/credentials). The skill explicitly warns against hardcoding secrets and recommends usingDefaultAzureCredentialfor authentication, which is a strong security practice. While an agent could be instructed to use this skill to upload sensitive local data to a malicious blob storage account, this is a risk inherent to the functionality of any data transfer skill, not a vulnerability within the skill's instructions themselves. Therefore, no direct malicious data exfiltration patterns were detected in the skill's code or instructions. -
Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected in either file.
-
Unverifiable Dependencies (LOW): The
SKILL.mdfile instructs the user to runpip install azure-storage-blob azure-identity. These packages are maintained by theazureorganization on GitHub, which is listed as a trusted external source. Thereferences/acceptance-criteria.mdalso referenceshttps://github.com/Azure/azure-sdk-for-python, another trusted source. This is noted as a LOW severity finding because it involves external downloads, but the source is trusted. -
Privilege Escalation: No commands or instructions that attempt to acquire elevated privileges (e.g.,
sudo,chmod +x,chmod 777, modifications to system files) were found. -
Persistence Mechanisms: No instructions for establishing persistence (e.g., modifying shell configuration files, creating cron jobs, setting up LaunchAgents/Daemons) were found.
-
Metadata Poisoning: The metadata fields (
name,description,package) inSKILL.mdare benign and accurately describe the skill's purpose. -
Indirect Prompt Injection (INFO): As the skill enables interaction with arbitrary blob content, an agent processing data downloaded from blob storage could theoretically be susceptible to indirect prompt injection if the blob content itself contains malicious instructions. This is a general risk for any skill that processes external, untrusted data, and not a direct vulnerability in the skill's instructions.
-
Time-Delayed / Conditional Attacks: No conditional logic based on dates, times, usage counts, or environment variables that would trigger malicious behavior were found.
Conclusion: The skill is well-documented, provides legitimate functionality, and adheres to good security practices by recommending secure authentication methods. The external dependencies are from trusted sources. The potential risks are inherent to the nature of a data transfer skill rather than malicious intent within the skill's instructions.