azure-communication-callautomation-java
Warn
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
The skill files (SKILL.md, references/acceptance-criteria.md, references/examples.md) were analyzed for security vulnerabilities. The primary function of the skill is to demonstrate the usage of the Azure Communication Services Call Automation Java SDK.
1. Data Exfiltration (MEDIUM):
- The
references/examples.mdfile demonstratesTranscriptionOptionswhich allows configuring awss://your-websocket-urlfor real-time transcription. If a user provides a malicious or untrusted WebSocket URL, sensitive transcription data could be exfiltrated to an attacker-controlled endpoint. The skill itself does not provide a malicious URL, but the example demonstrates a pattern that could be misused.- Evidence:
wss://your-websocket-urlinreferences/examples.md(Line 108)
- Evidence:
2. Unverifiable Dependencies / External Downloads (MEDIUM):
- The
references/examples.mdfile demonstratesTranscriptionOptionswhich allows configuring awss://your-websocket-url. This represents an external connection to a user-defined endpoint that cannot be verified by the skill itself. If this URL is untrusted, it poses a risk.- Evidence:
wss://your-websocket-urlinreferences/examples.md(Line 108)
- Evidence:
- Both
SKILL.mdandreferences/examples.mddemonstratecallRecording.downloadTo(recordingUrl, Paths.get("recording.mp4")). TherecordingUrlis obtained from an event, which could potentially be manipulated by an attacker in a real-world scenario. If therecordingUrlpoints to an internal network resource, it could lead to Server-Side Request Forgery (SSRF). If it points to a malicious external file, it could lead to downloading untrusted content.- Evidence:
callRecording.downloadTo(recordingUrl, Paths.get("recording.mp4"))inSKILL.md(Line 160) andreferences/examples.md(Line 268)
- Evidence:
3. Trusted External Sources (INFO):
- The skill uses
com.azure:azure-communication-callautomationas a Maven dependency. This is from thecom.azureorganization, which is a trusted GitHub organization (Microsoft Azure).- Evidence:
<groupId>com.azure</groupId>inSKILL.md(Line 10) andreferences/examples.md(Line 24)
- Evidence:
- The
references/acceptance-criteria.mdfile referenceshttps://github.com/Azure/azure-sdk-for-java. This is a trusted GitHub organization.- Evidence:
https://github.com/Azure/azure-sdk-for-javainreferences/acceptance-criteria.md(Line 4)
- Evidence:
- The skill demonstrates downloading audio files from
https://storage.blob.core.windows.net/audio/welcome.wav. This is a trusted Microsoft Azure domain.- Evidence:
https://storage.blob.core.windows.net/audio/welcome.wavinSKILL.md(Line 100) andreferences/examples.md(Line 139)
- Evidence:
- The skill uses Azure Communication Services endpoints like
https://<resource>.communication.azure.comand Cognitive Services endpoints likehttps://cognitive-services.cognitiveservices.azure.com/. These are trusted Microsoft Azure domains.- Evidence:
https://<resource>.communication.azure.cominSKILL.md(Line 23) andreferences/examples.md(Line 89)
- Evidence:
- The skill uses placeholder callback URLs such as
https://your-app.com/api/callbacksandhttps://<myendpoint>/Events. While not inherently malicious, these represent external connections that the user must configure and secure appropriately.- Evidence:
https://your-app.com/api/callbacksinSKILL.md(Line 50) andreferences/examples.md(Line 60)
- Evidence:
No other critical or high-severity threats were detected. The skill does not contain prompt injection, obfuscation, privilege escalation, persistence mechanisms, or time-delayed attacks. The examples correctly advise against hardcoding connection strings.
Audit Metadata