Azure Infra
Chat-based Azure infrastructure assistance using Azure CLI and portal context. Use for querying, auditing, and monitoring Azure resources (VMs, Storage, IAM, Functions, AKS, App Service, Key Vault, Azure Monitor, billing, etc.), and for proposing safe changes with explicit confirmation before any write/destructive action.
MIT-0 · Free to use, modify, and redistribute. No attribution required.
⭐ 2 · 2.4k · 3 current installs · 3 all-time installs
by@bmdhodl
MIT-0
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The SKILL.md explicitly instructs the agent to use the local Azure CLI (commands like `az account show`, `az login`, and many `az ...` queries). Despite that, the registry metadata declares no required binaries and no primary credential. A legitimate Azure CLI–based skill would normally declare the CLI dependency (and often note it needs Azure credentials); the omission is an inconsistency that could mislead users about what the skill will access.
Instruction Scope
The runtime instructions are narrowly scoped: they default to read‑only Azure CLI queries, require explicit confirmation before write/destructive actions, recommend dry‑runs when available, and do not instruct the agent to read arbitrary local files or call unexpected external endpoints. There is no prose directing exfiltration or broad system probing.
Install Mechanism
This is an instruction‑only skill with no install spec and no code files — low installation risk (nothing is downloaded or written to disk by the skill itself).
Credentials
The skill declares no required environment variables or primary credential, yet it will operate using whatever Azure authentication is present in the environment (az CLI access tokens, service principal credentials, or user login). That implicit access to Azure credentials and resources is not surfaced in the metadata; users should be aware the agent can run CLI commands that read or list sensitive cloud resources depending on the identity configured for az.
Persistence & Privilege
The skill does not request persistent/system‑wide privileges, is not always: true, and has no install steps that modify other skills or global agent settings. Autonomous invocation is allowed (the platform default), which increases blast radius if misused, but is not by itself a defect.
What to consider before installing
This skill appears to be a straightforward Azure CLI helper, but the metadata fails to declare the obvious dependency on the Azure CLI and does not call out that it will use whatever Azure credentials are already configured. Before installing or invoking it: (1) verify the skill's source/author and prefer an official publisher; (2) ensure the host's az CLI is present and that you understand which Azure identity (user login or service principal) the agent will use; (3) restrict that identity to least privilege or use a dedicated test subscription if possible; (4) do not allow the agent to execute write/destructive commands without manually reviewing the exact CLI command and confirming execution; (5) if you want stricter control, disable autonomous skill invocation for this skill or require an explicit enable step; and (6) ask the publisher to update metadata to declare the az dependency and explicitly state credential access so the risk is transparent.Like a lobster shell, security has layers — review code before you run it.
Current versionv1.0.0
Download zipazureinfralatest
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
SKILL.md
Azure Infra
Overview
Use the local Azure CLI to answer questions about Azure resources. Default to read‑only queries. Only propose or run write/destructive actions after explicit user confirmation.
Quick Start
- Ensure login:
az account show(if not logged in, runaz login --use-device-code). - If multiple subscriptions exist, ask the user to pick one; otherwise use the default subscription.
- Use read‑only commands to answer the question.
- If the user asks for changes, outline the exact command and ask for confirmation before running.
Safety Rules (must follow)
- Treat all actions as read‑only unless the user explicitly requests a change and confirms it.
- For any potentially destructive change (delete/terminate/destroy/modify/scale/billing/IAM credentials), require a confirmation step.
- Prefer
--dry-runwhen available and show the plan before execution. - Never reveal or log secrets (keys, client secrets, tokens).
Task Guide (common requests)
- Inventory / list: use
list/show/getcommands. - Health / errors: use Azure Monitor metrics/logs queries.
- Security checks: RBAC roles, public storage, NSG exposure, Key Vault access.
- Costs: Cost Management (read‑only).
- Changes: show exact CLI command and require confirmation.
Subscription & Tenant Handling
- If the user specifies a subscription/tenant, honor it.
- Otherwise use the default subscription from
az account show. - When results are subscription‑scoped, state the subscription used.
References
See references/azure-cli-queries.md for common command patterns.
Assets
assets/icon.svg— custom icon (dark cloud + terminal prompt, Azure‑blue accent)
Files
3 totalSelect a file
Select a file to preview.
Comments
Loading comments…
