azure-communication-common-java
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill consists of three Markdown files: SKILL.md, references/acceptance-criteria.md, and references/examples.md. All files primarily serve as documentation and provide code examples for using the Azure Communication Services Common SDK for Java. No executable scripts or direct commands are present within the skill's instructions. The code snippets are illustrative and demonstrate standard, secure practices for SDK usage.
- Prompt Injection: No patterns indicative of prompt injection attempts were found across any of the files. The language used is instructional and technical, without any manipulative phrases or attempts to override AI behavior.
- Data Exfiltration: No direct commands or code snippets designed to exfiltrate sensitive user data were detected. The examples demonstrate how to handle user tokens, but explicitly warn against logging or exposing them (e.g., "Never log or expose full tokens" in Best Practices). While
references/examples.mdshows an example of anHttpClientmaking a network request to atokenEndpoint, this is for the legitimate purpose of fetching a new token as part of the SDK's functionality, not for exfiltrating local data to an attacker-controlled server. ThetokenEndpointis a variable that would be configured by the user. - Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, URL/hex/HTML encoding) were found in any of the files. All content is presented in clear, readable plaintext.
- Unverifiable Dependencies: The skill references a Maven dependency:
com.azure:azure-communication-common. This dependency belongs to thecom.azuregroup, which is part of theazureGitHub organization, a recognized trusted external source. Other libraries likecom.fasterxml.jackson.databindare also standard and widely used. These are library references for compilation, not direct script downloads or executions. Given the trusted source, this is not considered a security risk in this context. - Privilege Escalation: No commands or instructions that would attempt to escalate privileges (e.g.,
sudo,chmod 777, service installations) were found. - Persistence Mechanisms: No patterns for establishing persistence (e.g., modifying
.bashrc, creating cron jobs, systemd services) were detected. - Metadata Poisoning: The metadata fields (name, description) in
SKILL.mdare benign and accurately describe the skill's purpose. No malicious instructions were hidden in metadata. - Indirect Prompt Injection: The skill itself is documentation and does not process external, untrusted user input in a way that would make it susceptible to indirect prompt injection.
- Time-Delayed / Conditional Attacks: No conditional logic designed to trigger malicious behavior based on time, usage, or specific environmental factors was found.
Overall, the skill is purely descriptive and provides code examples for using a legitimate SDK. It adheres to good security practices by warning against token exposure and suggesting the use of environment variables. The external dependencies are from trusted sources and are standard for Java development.
- Contains 1 malicious URL(s) - DO NOT USE