avm-terraform-module-development
Fail
Audited by Gen Agent Trust Hub on May 4, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The documentation in
references/tfpluginschema.mddirects the user to download a binary tool (tfpluginschema) from a personal GitHub repository (github.com/matt-FFFFFF/tfpluginschema). This source is not recognized as a trusted organization or a well-known service provider, introducing a supply chain risk. - [REMOTE_CODE_EXECUTION]: Installation instructions for the
tfpluginschematool include downloading archives from the internet and piping the output directly to extraction commands (tar -xz) or usingInvoke-WebRequestto download and expand binaries into system paths (/usr/local/bin). This pattern of fetching and deploying unverified binaries is a high-risk security practice. - [COMMAND_EXECUTION]: The skill includes shell and PowerShell scripts (
scripts/azure-schemaandscripts/azure-schema.ps1) that perform network operations and local file system interactions using commands likecurl,jq, andInvoke-WebRequestto manage schema data. - [EXTERNAL_DOWNLOADS]: The resource schema query scripts download data from the official Azure Verified Modules support repository on GitHub (
github.com/Azure/bicep-types-az). This is consistent with the skill's stated purpose for Azure module development.
Recommendations
- AI detected serious security threats
Audit Metadata