azure-cli
Fail
Audited by Snyk on Mar 10, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.90). The prompt includes explicit examples that pass secrets directly on the command line (e.g., az login --service-principal -u APP_ID -p PASSWORD -t TENANT_ID), which encourages embedding secret values verbatim in generated commands/outputs and creates an exfiltration risk despite also showing safer env-var/--password-stdin patterns.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill contains an explicit installation command that would fetch and execute remote code at setup time—curl -sL https://aka.ms/InstallAzureCliLinux | bash—which is a required installation path for using the skill's az-based scripts, so this URL poses a runtime remote-code-execution risk.
Audit Metadata