az-devops-cli
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Provides extensive examples for using the official Azure DevOps CLI toolset to manage projects, repositories, pipelines, and security configurations.
- [EXTERNAL_DOWNLOADS]: Fetches the official Azure CLI installation script from a Microsoft-owned domain (
aka.ms) for environment setup. - [REMOTE_CODE_EXECUTION]: Documents a pattern for downloading and executing a setup script from a trusted provider (Microsoft) using a
curl | bashcommand during the prerequisites stage. - [PROMPT_INJECTION]: Identifies an indirect prompt injection surface (Category 8) where external data such as git commit messages are interpolated directly into shell command arguments in automation examples.
- Ingestion points: Git commit messages and branch names are read into variables in
references/workflows-and-patterns.md. - Boundary markers: Delimiters are absent in the examples when interpolating dynamic content into commands like
az repos pr create. - Capability inventory: The skill uses commands that can modify repository content, update work items, and interact with network service connections.
- Sanitization: Examples do not demonstrate sanitization or escaping of shell variables containing untrusted repository metadata.
Audit Metadata