az-devops-cli

Pass

Audited by Gen Agent Trust Hub on Mar 25, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Provides extensive examples for using the official Azure DevOps CLI toolset to manage projects, repositories, pipelines, and security configurations.
  • [EXTERNAL_DOWNLOADS]: Fetches the official Azure CLI installation script from a Microsoft-owned domain (aka.ms) for environment setup.
  • [REMOTE_CODE_EXECUTION]: Documents a pattern for downloading and executing a setup script from a trusted provider (Microsoft) using a curl | bash command during the prerequisites stage.
  • [PROMPT_INJECTION]: Identifies an indirect prompt injection surface (Category 8) where external data such as git commit messages are interpolated directly into shell command arguments in automation examples.
  • Ingestion points: Git commit messages and branch names are read into variables in references/workflows-and-patterns.md.
  • Boundary markers: Delimiters are absent in the examples when interpolating dynamic content into commands like az repos pr create.
  • Capability inventory: The skill uses commands that can modify repository content, update work items, and interact with network service connections.
  • Sanitization: Examples do not demonstrate sanitization or escaping of shell variables containing untrusted repository metadata.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 25, 2026, 09:49 PM