azure-resource-availability
Pass
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on executing shell commands via the Azure CLI (
az) andjqto query resource availability and metadata. These commands are executed in the host environment and perform operations such as listing SKUs and checking quotas.- [DATA_EXFILTRATION]: The skill queries subscription-level metadata, including quota usage, resource availability, and provider registration status. While this is the intended functionality, it involves accessing potentially sensitive configuration and usage data from the Azure environment.- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection and command injection through its data ingestion process. It extracts variables from external files and user input to construct shell commands. - Ingestion points: The skill parses
template.json,requirements.json, and direct user input to extract values for{region},{sku_name},{namespace}, and{resourceType}. - Boundary markers: Absent. The instructions do not provide delimiters or instructions to the agent to treat input data as non-executable content.
- Capability inventory: The skill uses shell subprocess calls to execute
azandjqcommands based on interpolated variables. - Sanitization: Absent. The skill does not specify any validation, filtering, or escaping of the strings parsed from input files before they are used as arguments in shell commands.
Audit Metadata