azure-cli

Fail

Audited by Snyk on Mar 10, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.90). The prompt includes explicit examples that pass secrets directly on the command line (e.g., az login --service-principal -u APP_ID -p PASSWORD -t TENANT_ID), which encourages embedding secret values verbatim in generated commands/outputs and creates an exfiltration risk despite also showing safer env-var/--password-stdin patterns.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill contains an explicit installation command that would fetch and execute remote code at setup time—curl -sL https://aka.ms/InstallAzureCliLinux | bash—which is a required installation path for using the skill's az-based scripts, so this URL poses a runtime remote-code-execution risk.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 10, 2026, 03:34 AM