azure-storage-file-share-py

Pass

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: LOWNO_CODE
Full Analysis

The skill primarily consists of documentation and code snippets demonstrating the usage of the azure-storage-file-share Python SDK. No executable scripts are directly provided within the skill's main definition.

  1. Prompt Injection: No patterns indicative of prompt injection attempts (e.g., 'IMPORTANT: Ignore', 'jailbreak') were found in the skill's description or content.

  2. Data Exfiltration: The skill demonstrates retrieving Azure credentials from environment variables (os.environ), which is a secure and recommended practice. There are no commands or code snippets that attempt to read sensitive local files (e.g., ~/.ssh/id_rsa) or exfiltrate data to untrusted external domains.

  3. Obfuscation: No obfuscation techniques (e.g., Base64 encoding, zero-width characters, homoglyphs) were detected in the skill's files.

  4. Unverifiable Dependencies (INFO): The skill instructs users to install azure-storage-file-share via pip. The references/acceptance-criteria.md file explicitly links this dependency to https://github.com/Azure/azure-sdk-for-python, which is a repository under the Azure GitHub organization, a recognized trusted source. Therefore, this external dependency is considered low risk.

  5. Privilege Escalation: No commands or instructions that would lead to privilege escalation (e.g., sudo, chmod 777, system service modifications) were found.

  6. Persistence Mechanisms: No attempts to establish persistence (e.g., modifying .bashrc, creating cron jobs, altering SSH authorized keys) were detected.

  7. Metadata Poisoning: The skill's metadata (name, description) is benign and accurately reflects its purpose.

  8. Indirect Prompt Injection (INFO): As the skill facilitates interaction with Azure Storage File Shares, which can store arbitrary user-provided data, there is an inherent, indirect risk of prompt injection if the AI agent were to process untrusted content retrieved from these shares. This is a general risk associated with processing external data and not a direct vulnerability in the skill's code itself.

  9. Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers for malicious behavior were identified.

Conclusion: The skill is well-documented, uses secure practices for credential handling, and relies on a trusted external dependency. No direct security vulnerabilities were found.

Audit Metadata
Risk Level
LOW
Analyzed
Feb 13, 2026, 10:26 AM