azure-devops
Pass
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: SAFE
Full Analysis
- [Data Exposure & Exfiltration] (SAFE): The implementation utilizes the
keyringlibrary to manage Azure DevOps Personal Access Tokens (PAT) and OAuth tokens. This is a secure practice that avoids storing sensitive credentials in plain text files or environment variables. - [Data Exposure & Exfiltration] (SAFE): The
downloadtool inscripts/attachments.pyimplements a whitelist check for hostnames (_ALLOWED_HOSTS). This ensures that the agent's Authorization headers are only sent to verified Azure DevOps domains, effectively preventing credential exfiltration through malicious attachment URLs. - [Command Execution] (SAFE): The scripts avoid using dangerous functions like
os.system(),subprocess.run(), oreval(). All interactions with the Azure DevOps service are performed through the standard Pythonurllib.requestlibrary. - [Indirect Prompt Injection] (LOW): The skill has a large attack surface as it reads data from various Azure DevOps components (Wikis, Work Items, Pipelines). While an attacker could place malicious instructions in these locations, the skill itself does not perform any unsafe interpolation or execution of the retrieved data. It simply provides the data back to the agent as structured JSON.
Audit Metadata