azure-communication-callautomation-java

Warn

Audited by Gen Agent Trust Hub on Feb 13, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis

The skill files (SKILL.md, references/acceptance-criteria.md, references/examples.md) were analyzed for security vulnerabilities. The primary function of the skill is to demonstrate the usage of the Azure Communication Services Call Automation Java SDK.

1. Data Exfiltration (MEDIUM):

  • The references/examples.md file demonstrates TranscriptionOptions which allows configuring a wss://your-websocket-url for real-time transcription. If a user provides a malicious or untrusted WebSocket URL, sensitive transcription data could be exfiltrated to an attacker-controlled endpoint. The skill itself does not provide a malicious URL, but the example demonstrates a pattern that could be misused.
    • Evidence: wss://your-websocket-url in references/examples.md (Line 108)

2. Unverifiable Dependencies / External Downloads (MEDIUM):

  • The references/examples.md file demonstrates TranscriptionOptions which allows configuring a wss://your-websocket-url. This represents an external connection to a user-defined endpoint that cannot be verified by the skill itself. If this URL is untrusted, it poses a risk.
    • Evidence: wss://your-websocket-url in references/examples.md (Line 108)
  • Both SKILL.md and references/examples.md demonstrate callRecording.downloadTo(recordingUrl, Paths.get("recording.mp4")). The recordingUrl is obtained from an event, which could potentially be manipulated by an attacker in a real-world scenario. If the recordingUrl points to an internal network resource, it could lead to Server-Side Request Forgery (SSRF). If it points to a malicious external file, it could lead to downloading untrusted content.
    • Evidence: callRecording.downloadTo(recordingUrl, Paths.get("recording.mp4")) in SKILL.md (Line 160) and references/examples.md (Line 268)

3. Trusted External Sources (INFO):

  • The skill uses com.azure:azure-communication-callautomation as a Maven dependency. This is from the com.azure organization, which is a trusted GitHub organization (Microsoft Azure).
    • Evidence: <groupId>com.azure</groupId> in SKILL.md (Line 10) and references/examples.md (Line 24)
  • The references/acceptance-criteria.md file references https://github.com/Azure/azure-sdk-for-java. This is a trusted GitHub organization.
    • Evidence: https://github.com/Azure/azure-sdk-for-java in references/acceptance-criteria.md (Line 4)
  • The skill demonstrates downloading audio files from https://storage.blob.core.windows.net/audio/welcome.wav. This is a trusted Microsoft Azure domain.
    • Evidence: https://storage.blob.core.windows.net/audio/welcome.wav in SKILL.md (Line 100) and references/examples.md (Line 139)
  • The skill uses Azure Communication Services endpoints like https://<resource>.communication.azure.com and Cognitive Services endpoints like https://cognitive-services.cognitiveservices.azure.com/. These are trusted Microsoft Azure domains.
    • Evidence: https://<resource>.communication.azure.com in SKILL.md (Line 23) and references/examples.md (Line 89)
  • The skill uses placeholder callback URLs such as https://your-app.com/api/callbacks and https://<myendpoint>/Events. While not inherently malicious, these represent external connections that the user must configure and secure appropriately.
    • Evidence: https://your-app.com/api/callbacks in SKILL.md (Line 50) and references/examples.md (Line 60)

No other critical or high-severity threats were detected. The skill does not contain prompt injection, obfuscation, privilege escalation, persistence mechanisms, or time-delayed attacks. The examples correctly advise against hardcoding connection strings.

Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 13, 2026, 10:25 AM