Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
powershell_heavy
missing_linux_example
windows_tools
windows_first
Summary
The documentation page demonstrates a clear Windows bias. All command-line examples are provided exclusively in PowerShell, with no equivalent Bash, curl, or cross-platform scripting examples. The use of Azure PowerShell and references to the Azure portal (a web UI, but often associated with Windows-centric workflows) further reinforce this bias. There are no Linux-native or cross-platform command-line instructions, and the PowerShell examples are presented as the default and only way to perform key tasks.
Recommendations
  • Provide equivalent Bash/curl examples for token generation and API calls, ensuring Linux and macOS users can follow along without PowerShell.
  • Clearly indicate that the Azure portal is web-based and accessible from any OS, to avoid the impression of Windows exclusivity.
  • Wherever PowerShell scripts are given, add corresponding Bash/curl or Python examples side-by-side.
  • Review all prerequisite and tool references to ensure they are not Windows-specific, or provide Linux alternatives where necessary.
  • Explicitly mention cross-platform compatibility in relevant sections to reassure non-Windows users.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2025-07-12 23:44 #41 cancelled Biased Biased
2025-07-12 00:58 #8 cancelled Clean Clean
2025-07-10 05:06 #7 processing Clean Clean
2025-07-09 23:22 #6 cancelled Clean Clean

Flagged Code Snippets

# Replace placeholder values with your own values.

$clientId = "00001111-aaaa-2222-bbbb-3333cccc4444" # Client (application) ID of client application
$clientSecret = "******" # Retrieve secret of client application in developer portal
$scopeOfOtherApp = "api://55556666-ffff-7777-aaaa-8888bbbb9999/.default" # Value of Audience in product properties
$tenantId = "aaaabbbb-0000-cccc-1111-dddd2222eeee" # Directory (tenant) ID in Microsoft Entra ID

$body = @{
    grant_type    = "client_credentials"
    client_id     = $clientId
    client_secret = $clientSecret
    scope         = $scopeOfOtherApp
}
$response = Invoke-RestMethod -Method Post -Uri "https://login.microsoftonline.com/$tenantId/oauth2/v2.0/token" -ContentType "application/x-www-form-urlencoded" -Body $body
$token = $response.access_token
# Gatewate endpoint to call. Update with URI of API operation you want to call.
$uri = "https://<gateway-hostname>/echo/resource?param1=sample"
$headers = @{
   "Authorization" = "Bearer $token"  # $token is the token generated in the previous script.
}
$body = @{
    "hello" = "world"
} | ConvertTo-Json -Depth 5

$getresponse = Invoke-RestMethod -Method Post -Uri $uri -ContentType "application/x-www-form-urlencoded" -Headers $headers -Body $body
Write-Host "Response:"
$getresponse | ConvertTo-Json -Depth 5