From asi
Audits Azure Blob and ADLS storage accounts for public access exposure, weak or long-lived SAS tokens, missing encryption at rest, disabled HTTPS-only traffic, and outdated TLS versions using azure-mgmt-storage Python SDK. Useful for cloud security audits and incident investigations.
npx claudepluginhub plurigrid/asi --plugin asiThis skill uses the workspace's default tool permissions.
Azure Storage accounts are a frequent target for attackers due to misconfigured public access, long-lived SAS tokens, missing encryption, and outdated TLS versions. This skill uses the azure-mgmt-storage Python SDK with StorageManagementClient to enumerate all storage accounts in a subscription, inspect their security properties, list blob containers for public access settings, and generate a r...
Audits Azure Blob/ADLS storage accounts for public access, weak SAS tokens, missing encryption, HTTPS/TLS issues using azure-mgmt-storage Python SDK. Outputs risk-scored JSON report.
Detects misconfigured Azure Storage accounts including public blob containers, missing encryption, permissive SAS tokens, disabled logging, and network violations using Azure CLI, PowerShell, and Defender for Storage. For security audits and compliance.
Audits Azure Blob and ADLS storage accounts for public access exposure, weak/long SAS tokens, missing encryption, disabled HTTPS-only traffic, and outdated TLS using azure-mgmt-storage Python SDK.
Share bugs, ideas, or general feedback.
Azure Storage accounts are a frequent target for attackers due to misconfigured public access, long-lived SAS tokens, missing encryption, and outdated TLS versions. This skill uses the azure-mgmt-storage Python SDK with StorageManagementClient to enumerate all storage accounts in a subscription, inspect their security properties, list blob containers for public access settings, and generate a risk-scored audit report identifying critical misconfigurations.
azure-mgmt-storage, azure-identityallow_blob_public_access enabled on storage account or individual containers set to Blob/Container access levelenable_https_traffic_only disabled, allowing unencrypted HTTP trafficJSON report with per-account findings, severity ratings (Critical/High/Medium/Low), and remediation recommendations aligned with CIS Azure Benchmark controls.