m365-agents-dotnet
Fail
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: HIGHPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- Indirect Prompt Injection (MEDIUM): The skill provides a framework for processing external user messages that are treated as trusted input.
- Ingestion points: External data enters through the
IAgentHttpAdapter.ProcessAsyncmethod at the/api/messagesendpoint inSKILL.mdandreferences/acceptance-criteria.md. - Boundary markers: Absent. There are no delimiters or instructions provided to differentiate user input from system instructions.
- Capability inventory: The agent can send activities (
SendActivityAsync), delete conversation state (DeleteStateAsync), and interact with Copilot Studio engines (CopilotClient). - Sanitization: Absent. User input is echoed directly in the
OnMessageAsynchandler without validation. - Data Exposure & Exfiltration (MEDIUM): The error handling implementation leads to potential information disclosure.
- Evidence: In
SKILL.md, theOnTurnErrorAsyncmethod capturesexception.Messageand sends it to the user. This practice frequently leaks sensitive internal details, such as stack traces or internal configuration, to end-users. - External Downloads (LOW): The skill requires several NuGet packages.
- Evidence:
dotnet add package Microsoft.Agents.*commands inSKILL.md. - Trust Status: Packages belong to the
microsoftorganization, which is a Trusted External Source. Per [TRUST-SCOPE-RULE], this finding is downgraded to LOW/INFO. - Scanner Alert (INFO): An automated scanner flagged 'Microsoft.Agents.Authentication.Ms' as a phishing URL.
- Analysis: This appears to be a false positive where the scanner misidentified the
.Msalpackage namespace suffix as a Montserrat (.ms) TLD phishing domain. No evidence of malicious URLs was found in the code.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata