azure-storage-file-share-py
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill primarily consists of documentation and code snippets demonstrating the usage of the azure-storage-file-share Python SDK. No executable scripts are directly provided within the skill's main definition.
-
Prompt Injection: No patterns indicative of prompt injection attempts (e.g., 'IMPORTANT: Ignore', 'jailbreak') were found in the skill's description or content.
-
Data Exfiltration: The skill demonstrates retrieving Azure credentials from environment variables (
os.environ), which is a secure and recommended practice. There are no commands or code snippets that attempt to read sensitive local files (e.g.,~/.ssh/id_rsa) or exfiltrate data to untrusted external domains. -
Obfuscation: No obfuscation techniques (e.g., Base64 encoding, zero-width characters, homoglyphs) were detected in the skill's files.
-
Unverifiable Dependencies (INFO): The skill instructs users to install
azure-storage-file-shareviapip. Thereferences/acceptance-criteria.mdfile explicitly links this dependency tohttps://github.com/Azure/azure-sdk-for-python, which is a repository under theAzureGitHub organization, a recognized trusted source. Therefore, this external dependency is considered low risk. -
Privilege Escalation: No commands or instructions that would lead to privilege escalation (e.g.,
sudo,chmod 777, system service modifications) were found. -
Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs, altering SSH authorized keys) were detected. -
Metadata Poisoning: The skill's metadata (name, description) is benign and accurately reflects its purpose.
-
Indirect Prompt Injection (INFO): As the skill facilitates interaction with Azure Storage File Shares, which can store arbitrary user-provided data, there is an inherent, indirect risk of prompt injection if the AI agent were to process untrusted content retrieved from these shares. This is a general risk associated with processing external data and not a direct vulnerability in the skill's code itself.
-
Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were identified.
Conclusion: The skill is well-documented, uses secure practices for credential handling, and relies on a trusted external dependency. No direct security vulnerabilities were found.