detecting-azure-service-principal-abuse
0
Detect and investigate Azure service principal abuse including privilege escalation, credential compromise, admin consent bypass, and unauthorized enumeration in Microsoft Entra ID environments.
Install this skill
Run this command in your terminal. No account required — it auto-detects your AI tool and installs the skill file.
npx @skills-hub-ai/cli install cybersecurity-skills-detecting-azure-service-principal-abuseOr download directly:
View all CLI commands →Setup by platform
Instructions
Security
Loading security scan...