dotnet-elastic-apm
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATION
Full Analysis
- [DATA_EXFILTRATION] (MEDIUM): Insecure Transport Security Configuration. The provided code in
Infrastructure/Extensions/ExtensionLogging.csincludestransport.ServerCertificateValidationCallback((a, b, c, d) => true);. This explicitly disables SSL/TLS certificate validation for the connection to Elasticsearch. While often used for local development, this pattern is a major security risk that permits Man-in-the-Middle (MitM) attacks. An attacker on the network could intercept theBasicAuthenticationcredentials (elasticUser,elasticPass) and all structured log data. Although theProgram.csexample includes a check forIsDevelopment(), the presence of this code in the core infrastructure template increases the risk of accidental deployment to production environments. - [DATA_EXPOSURE] (LOW): Sensitive Information Handling. While the skill correctly instructs the AI to never log PII or credentials, it suggests a configuration schema where Elasticsearch credentials are stored in
appsettings.json. If developers follow this template and check the configuration files into version control without using secure secrets management (like Azure Key Vault or AWS Secrets Manager), it results in credential exposure.
Audit Metadata