Sad Tux - Windows bias detected
This page contains Windows bias

About This Page

This page is part of the Azure documentation. It contains code examples and configuration instructions for working with Azure services.

Bias Analysis

Detected Bias Types
windows_first
powershell_heavy
Summary
The documentation provides both PowerShell and Azure CLI examples for all operations, but consistently lists PowerShell (a Windows-centric tool) before Azure CLI in every code tab and example. There are no Linux-specific shell examples (e.g., Bash scripts), and the CLI examples are generic, but the ordering and emphasis may suggest a preference for Windows/PowerShell users.
Recommendations
  • Alternate the order of PowerShell and Azure CLI examples, or place Azure CLI first, as it is cross-platform and widely used on Linux.
  • Explicitly mention that Azure CLI commands work on Linux, macOS, and Windows, and provide Bash-specific variable syntax in CLI examples where appropriate.
  • Consider adding Bash script examples or notes for Linux users, especially for variable assignment and scripting differences.
  • Clarify in introductory sections that both PowerShell and Azure CLI are supported on all major platforms, but that PowerShell examples use Windows-style syntax.
GitHub Create Pull Request

Scan History

Date Scan Status Result
2026-01-15 00:00 #254 completed Clean Clean
2026-01-14 00:00 #250 in_progress Clean Clean
2026-01-13 00:00 #246 completed Clean Clean
2026-01-11 00:00 #240 completed Biased Biased
2026-01-10 00:00 #237 completed Biased Biased
2026-01-09 00:34 #234 completed Biased Biased
2026-01-08 00:53 #231 completed Biased Biased
2026-01-06 18:15 #225 cancelled Clean Clean
2025-08-19 00:01 #85 completed Clean Clean
2025-07-13 21:37 #48 completed Biased Biased
2025-07-12 23:44 #41 cancelled Clean Clean

Flagged Code Snippets

$KvName  = "<key-vault-name>"
$KeyName = "<key-name>"
$enabled = $false
# $false to disable the key / $true to enable it

# Check the current state of the key (before and after enabling/disabling it)
Get-AzKeyVaultKey -Name $KeyName -VaultName $KvName

# Disable (or enable) the key
Update-AzKeyVaultKey -VaultName $KvName -Name $KeyName -Enable $enabled