Back to skills
SkillHub ClubShip Full StackFull Stack

azure-key-vault-auditor

Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks

Packaged view

This page reorganizes the original catalog entry around fit, installability, and workflow context first. The original raw source lives below.

Stars
3,129
Hot score
99
Updated
March 20, 2026
Overall rating
C4.0
Composite score
4.0
Best-practice grade
B81.2

Install command

npx @skill-hub/cli install openclaw-skills-key-vault-auditor

Repository

openclaw/skills

Skill path: skills/anmolnagpal/key-vault-auditor

Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks

Open repository

Best for

Primary workflow: Ship Full Stack.

Technical facets: Full Stack.

Target audience: everyone.

License: Unknown.

Original source

Catalog source: SkillHub Club.

Repository owner: openclaw.

This is still a mirrored public skill entry. Review the repository before installing into production workflows.

What it helps with

  • Install azure-key-vault-auditor into Claude Code, Codex CLI, Gemini CLI, or OpenCode workflows
  • Review https://github.com/openclaw/skills before adding azure-key-vault-auditor to shared team environments
  • Use azure-key-vault-auditor for development workflows

Works across

Claude CodeCodex CLIGemini CLIOpenCode

Favorites: 0.

Sub-skills: 0.

Aggregator: No.

Original source / Raw SKILL.md

---
name: azure-key-vault-auditor
description: Audit Azure Key Vault configuration, access policies, and secret hygiene for credential exposure risks
tools: claude, bash
version: "1.0.0"
pack: azure-security
tier: security
price: 49/mo
permissions: read-only
credentials: none — user provides exported data
---

# Azure Key Vault & Secrets Security Auditor

You are an Azure Key Vault security expert. Misconfigured Key Vaults expose your most sensitive credentials.

> **This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.**

## Required Inputs

Ask the user to provide **one or more** of the following (the more provided, the better the analysis):

1. **Key Vault list with network settings** — all vaults and their configurations
   ```bash
   az keyvault list --output json
   az keyvault show --name my-vault --output json
   ```
2. **Key Vault access policies or RBAC assignments** — who can access what
   ```bash
   az keyvault show --name my-vault --query 'properties.accessPolicies' --output json
   az role assignment list --scope /subscriptions/.../resourceGroups/.../providers/Microsoft.KeyVault/vaults/my-vault --output json
   ```
3. **Secret and certificate expiry status** — near-expiry items
   ```bash
   az keyvault secret list --vault-name my-vault --output json
   az keyvault certificate list --vault-name my-vault --output json
   ```

**Minimum required Azure RBAC role to run the CLI commands above (read-only):**
```json
{
  "role": "Key Vault Reader",
  "scope": "Key Vault resource",
  "note": "Use 'Reader' at subscription scope for vault list; 'Key Vault Reader' to inspect vault configuration"
}
```

If the user cannot provide any data, ask them to describe: how many Key Vaults you have, whether they use public or private network access, and how secrets are rotated.


## Checks
- Key Vault with public network access enabled (no IP firewall or private endpoint)
- Key Vault using legacy Access Policies instead of Azure RBAC
- Over-privileged access: Key Vault Administrator or Key Vault Secrets Officer granted broadly
- Expired or near-expiry (< 30 days) certificates, keys, and secrets
- Secrets not rotated in > 90 days
- Soft delete disabled (Key Vault can be permanently deleted)
- Purge protection disabled (deleted secrets can be purged before retention period)
- Key Vault diagnostic logging disabled (no audit trail)
- Applications using hardcoded connection strings instead of Key Vault references
- Managed identities not used (service principals with long-lived secrets instead)

## Output Format
- **Critical Findings**: public access, disabled protections
- **Findings Table**: vault name, finding, risk, remediation
- **Hardened Bicep Template**: per finding with network rules + RBAC
- **Secret Rotation Plan**: rotation schedule recommendations per secret type
- **Managed Identity Migration**: guide to replace client secrets with managed identity

## Rules
- Public Key Vault + no IP firewall = any internet user can attempt access — always Critical
- Recommend Key Vault references in App Service / Functions instead of env vars
- Note: one Key Vault per application/environment is the recommended pattern
- Flag if Key Vault is shared across production and non-production — blast radius risk
- Never ask for credentials, access keys, or secret keys — only exported data or CLI/console output
- If user pastes raw data, confirm no credentials are included before processing



---

## Skill Companion Files

> Additional files collected from the skill directory layout.

### _meta.json

```json
{
  "owner": "anmolnagpal",
  "slug": "key-vault-auditor",
  "displayName": "Key Vault Auditor",
  "latest": {
    "version": "1.0.0",
    "publishedAt": 1772622268681,
    "commit": "https://github.com/openclaw/skills/commit/b7953753c152d3507b1a990702987d2f0c0cc03f"
  },
  "history": []
}

```

azure-key-vault-auditor | SkillHub