azure-admin
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The README.md and SKILL.md files provide instructions for installing the Azure CLI and Azure Developer CLI using 'curl | bash' patterns. The URLs (aka.ms/InstallAzureCLIDeb and aka.ms/install-azd.sh) are official Microsoft short-links. As Microsoft is a trusted organization, these downloads are considered safe and consistent with the skill's intended administrative purpose.
- [COMMAND_EXECUTION]: The skill provides numerous Bash and PowerShell scripts (e.g., in tools/, examples/, and docs/) that execute Azure CLI ('az') and Azure Developer CLI ('azd') commands. These scripts are designed to perform legitimate cloud administration tasks such as user provisioning, RBAC management, and resource deployment.
- [PROMPT_INJECTION]: Analysis identified a surface for indirect prompt injection in Category 8. The scripts in 'examples/bulk-user-onboarding.md' and 'docs/user-management.md' ingest data from a 'users.csv' file without explicit sanitization before passing fields to CLI commands.
- Ingestion points: CSV file processing in 'bulk-create-users.sh'.
- Boundary markers: Absent in example scripts.
- Capability inventory: Subprocess execution of 'az' CLI and file system writes for logging.
- Sanitization: Relies on standard shell quoting; no specific filtering of CSV content. This is considered a low-risk surface given the administrative context.
- [CREDENTIALS_UNSAFE]: The documentation and example scripts include placeholder credentials and password templates (e.g., 'TempPass123!'). No real secrets or hardcoded production credentials were found. The skill correctly recommends the use of Azure Key Vault for secret management.
Audit Metadata