The skill allows arbitrary command execution and broad
Claims to do
AppInsights Instrumentation Guide: This skill provides **guidance and reference material** for instrumenting webapps with Azure Application Insights.
Actually does
This skill reads the user's application source code to identify its language and framework. It then provides instructions and references (local `.md` files and a `.ps1` script) for instrumenting the application with Azure Application Insights, including guidance for creating the App Insights resource via Bicep or Azure CLI, and modifying application code for ASP.NET Core, Node.js, or Python. It also offers quick references for OpenTelemetry SDKs.
/plugin marketplace add microsoft/azure-skills/plugin install appinsights-instrumentation@microsoft/azure-skillsgemini extensions install https://github.com/microsoft/azure-skills.git --consentnpx skills add https://github.com/microsoft/azure-skills --skill appinsights-instrumentationThe skill instructs the agent to use Azure CLI commands, referencing a PowerShell script (`scripts/appinsights.ps1`). This capability allows for the execution of arbitrary commands on the host system or cloud environment, potentially leading to resource manipulation, data exfiltration, or privilege escalation.
Use Azure CLI. See [scripts/appinsights.ps1](scripts/appinsights.ps1) for what Azure CLI command to execute...
The skill instructs the agent to read source code and Bicep templates, and to modify application code. This broad file system access, while necessary for its function, could be abused to exfiltrate sensitive data or inject malicious code.
Read the source code to make an educated guess. ... Add AppInsights to existing Bicep template. ... Modify application code
The skill explicitly instructs the agent to collect context information such as programming language, application framework, and hosting environment. This capability, while intended for legitimate purposes, could be leveraged for malicious reconnaissance if the agent's intent is compromised.
Collect context information ... Read the source code to make an educated guess. ... You must always ask the user where the application is hosted
[](https://mondoo.com/ai-agent-security/skills/github/microsoft/azure-skills/appinsights-instrumentation)<a href="https://mondoo.com/ai-agent-security/skills/github/microsoft/azure-skills/appinsights-instrumentation"><img src="https://mondoo.com/ai-agent-security/api/badge/github/microsoft/azure-skills/appinsights-instrumentation.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/microsoft/azure-skills/appinsights-instrumentation.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.