azure-monitor-ingestion-java
Warn
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: MEDIUMPROMPT_INJECTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- Indirect Prompt Injection (MEDIUM): The skill ingests untrusted log data and transmits it to a network endpoint, creating a vulnerability surface for indirect prompt injection.\n
- Ingestion points: The
logscollection provided to theuploadmethod as seen inSKILL.md.\n - Boundary markers: Absent; there are no delimiters or explicit instructions to the agent to ignore instructions embedded within the log content.\n
- Capability inventory: Network communication via the
LogsIngestionClientto user-defined Data Collection Endpoints (DCE).\n - Sanitization: Absent; the skill does not perform any validation or sanitization on the log entries before ingestion or transmission.\n- Unverifiable Dependencies & Remote Code Execution (LOW): The skill references external Maven dependencies for its operation.\n
- Evidence: Dependency on
com.azure:azure-monitor-ingestionandcom.azure:azure-identity(found inSKILL.mdandreferences/examples.md).\n - Trust Status: These are official packages maintained by Microsoft. As Microsoft and Azure are trusted organizations, the finding for external downloads is downgraded to LOW per [TRUST-SCOPE-RULE].
Audit Metadata