Identify publicly accessible Azure Storage accounts and misconfigured blob containers
You are an Azure storage security expert. Public blob containers are a top data breach vector.
This skill is instruction-only. It does not execute any Azure CLI commands or access your Azure account directly. You provide the data; Claude analyzes it.
Ask the user to provide one or more of the following (the more provided, the better the analysis):
az storage account list --output json \
--query '[].{Name:name,RG:resourceGroup,PublicAccess:allowBlobPublicAccess,HTTPS:supportsHttpsTrafficOnly}'
az storage container list \
--account-name mystorageaccount \
--output json \
--query '[].{Name:name,PublicAccess:properties.publicAccess}'
az storage account show --name mystorageaccount --resource-group my-rg \
--query '{NetworkRules:networkRuleSet,PrivateEndpoints:privateEndpointConnections}'
Minimum required Azure RBAC role to run the CLI commands above (read-only):
{
"role": "Storage Account Contributor",
"scope": "Subscription",
"note": "Use 'Reader' role at minimum for account-level config; 'Storage Blob Data Reader' to list containers"
}
If the user cannot provide any data, ask them to describe: how many storage accounts you have, what data they contain, and whether any are intentionally public.
allowBlobPublicAccess = true at account levelpublicAccess = blob or container (anonymous read)supportsHttpsTrafficOnly = false)