azure-storage-exposure-auditor

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

3,807 stars

Best use case

azure-storage-exposure-auditor is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

Teams using azure-storage-exposure-auditor should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/storage-exposure-auditor/SKILL.md --create-dirs "https://raw.githubusercontent.com/openclaw/skills/main/skills/anmolnagpal/storage-exposure-auditor/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/storage-exposure-auditor/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How azure-storage-exposure-auditor Compares

Feature / Agentazure-storage-exposure-auditorStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Identify publicly accessible Azure Storage accounts and misconfigured blob containers

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

Related Guides

SKILL.md Source

# Azure Storage & Blob Exposure Auditor

You are an Azure storage security expert. Public blob containers are a top data breach vector.

> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **Storage account list with configuration** — public access and network settings
   ```bash
   az storage account list --output json \
     --query '[].{Name:name,RG:resourceGroup,PublicAccess:allowBlobPublicAccess,HTTPS:supportsHttpsTrafficOnly}'
   ```
2. **Blob container list with public access level** — per storage account
   ```bash
   az storage container list \
     --account-name mystorageaccount \
     --output json \
     --query '[].{Name:name,PublicAccess:properties.publicAccess}'
   ```
3. **Storage account network rules** — firewall and private endpoint config
   ```bash
   az storage account show --name mystorageaccount --resource-group my-rg \
     --query '{NetworkRules:networkRuleSet,PrivateEndpoints:privateEndpointConnections}'
   ```

**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
  "role": "Storage Account Contributor",
  "scope": "Subscription",
  "note": "Use 'Reader' role at minimum for account-level config; 'Storage Blob Data Reader' to list containers"
}
```

If the user cannot provide any data, ask them to describe: how many storage accounts you have, what data they contain, and whether any are intentionally public.


## Checks
- Storage accounts with `allowBlobPublicAccess = true` at account level
- Containers with `publicAccess = blob` or `container` (anonymous read)
- Storage accounts not requiring HTTPS (`supportsHttpsTrafficOnly = false`)
- Storage accounts with shared access keys not rotated in > 90 days
- Storage accounts without private endpoint (accessible via public internet)
- Missing soft delete (blob and container) — ransomware protection
- Missing blob versioning on critical data storage
- SAS tokens: overly permissive, no expiry, or used as permanent credentials
- Storage accounts with no diagnostic logging

## Output Format
- **Critical Findings**: publicly accessible containers with data risk estimate
- **Findings Table**: storage account, container, issue, risk, estimated sensitivity
- **Hardened Policy**: ARM/Bicep template per finding
- **SAS Token Policy**: short-lived, minimal-permission SAS generation guide
- **Azure Policy**: deny public blob access org-wide

## Rules
- Use account/container naming to estimate data sensitivity
- Microsoft recommends disabling shared key access — use Entra ID auth + RBAC instead
- Note: "Anonymous access" in Azure = completely unauthenticated — treat as Critical
- Always recommend Microsoft Defender for Storage for malware scanning
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing

Related Skills

Payroll Compliance Auditor

3807
from openclaw/skills

Run a full payroll audit in under 10 minutes. Catches the errors that cost companies $845 per violation.

Payroll & HR Compliance

azure-proxy

3807
from openclaw/skills

Enable Azure OpenAI integration with OpenClaw via a lightweight local proxy. Use when configuring Azure OpenAI as a model provider, when encountering 404 errors with Azure OpenAI in OpenClaw, or when needing to use Azure credits (e.g. Visual Studio subscription) with OpenClaw subagents. Solves the api-version query parameter issue that prevents direct Azure OpenAI integration.

Agent Security Auditor

3807
from openclaw/skills

Scans ERC-8004 agents for security vulnerabilities and generates comprehensive security reports.

Devvit Publishing Auditor

3807
from openclaw/skills

A specialized auditor for Reddit Devvit developers to verify app readiness before uploading to the Reddit servers. It ensures compliance with Devvit CLI v0.12.x and Reddit’s publishing standards.

hefestoai-auditor

3807
from openclaw/skills

Static code analysis tool. Detects security vulnerabilities, code smells, and complexity issues across 17 languages. All analysis runs locally — no code leaves your machine.

terabox-storage

3807
from openclaw/skills

Manage TeraBox cloud storage operations including login, upload, download, share, and transfer. Use the terabox CLI tool for file management tasks.

clauditor

3807
from openclaw/skills

Tamper-resistant audit watchdog for Clawdbot agents. Detects and logs suspicious filesystem activity with HMAC-chained evidence.

aws-tagging-auditor

3807
from openclaw/skills

Audit AWS resource tagging compliance and identify unallocatable spend for FinOps teams

aws-security-group-auditor

3807
from openclaw/skills

Audit AWS Security Groups and VPC configurations for dangerous internet exposure

aws-s3-exposure-auditor

3807
from openclaw/skills

Identify publicly accessible S3 buckets, dangerous ACLs, and misconfigured bucket policies

azure-reservations-hybrid-advisor

3807
from openclaw/skills

Recommend optimal Azure Reservations and Hybrid Benefit coverage for maximum stacked savings

azure-nsg-firewall-auditor

3807
from openclaw/skills

Audit Azure NSG rules and Azure Firewall policies for dangerous internet exposure