Skip to main content
Version: 2.0.0

Test-MtAIAgentHardCodedCredentials

SYNOPSIS

Tests if AI agents have hard-coded credentials in topic definitions.

SYNTAX

Test-MtAIAgentHardCodedCredentials [-ProgressAction <ActionPreference>] [<CommonParameters>]

DESCRIPTION

Scans all Copilot Studio agent topics for patterns that suggest hard-coded credentials, API keys, connection strings, or secrets. Hard-coded credentials in agent topics can be extracted by prompt injection attacks and often persist after key rotation is performed elsewhere.

EXAMPLES

EXAMPLE 1

Test-MtAIAgentHardCodedCredentials

PARAMETERS

-ProgressAction

{{ Fill ProgressAction Description }}

Type: ActionPreference
Parameter Sets: (All)
Aliases: proga

Required: False
Position: Named
Default value: None
Accept pipeline input: False
Accept wildcard characters: False

CommonParameters

This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see about_CommonParameters.

INPUTS

OUTPUTS

[bool] - Returns $true if no hard-coded credentials are found, $false if any

agent topics contain credential patterns, $null if data is unavailable.

NOTES

https://maester.dev/docs/commands/Test-MtAIAgentHardCodedCredentials