skills/mukul975/anthropic-cybersecurity-skills/detecting-azure-service-principal-abuse/Gen Agent Trust Hub
detecting-azure-service-principal-abuse
Pass
Audited by Gen Agent Trust Hub on Apr 20, 2026
Risk Level: SAFE
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/process.pyutilizes thesubprocess.runmethod to execute Azure CLI (az) commands for environment auditing. The implementation uses argument lists and avoidsshell=True, which is a secure practice that prevents command injection vulnerabilities. - [EXTERNAL_DOWNLOADS]: The Python tools in
scripts/agent.pyandscripts/process.pyinteract with official Microsoft Graph API and OAuth2 endpoints (graph.microsoft.comandlogin.microsoftonline.com). These communications are directed to well-known, trusted service domains necessary for the skill's auditing functionality. - [CREDENTIALS_UNSAFE]: The skill requires Azure credentials to function, but it manages them securely by accepting them as command-line arguments at runtime. No hardcoded secrets, keys, or insecure credential storage patterns were detected in the source code.
Audit Metadata