azure-monitor-opentelemetry-exporter-java
Pass
Audited by Gen Agent Trust Hub on Feb 13, 2026
Risk Level: LOWNO_CODE
Full Analysis
The skill consists of markdown files (SKILL.md, references/acceptance-criteria.md, references/examples.md) providing instructions and Java code snippets for using Azure Monitor OpenTelemetry Exporter.
- Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, etc.) were detected in any of the files.
- Prompt Injection: No patterns indicative of prompt injection attempts were found.
- Data Exfiltration: The skill describes how to configure an
APPLICATIONINSIGHTS_CONNECTION_STRINGto send telemetry data to Azure Monitor. This is the intended function of the library and not considered malicious data exfiltration, as the destination is a legitimate, user-configured endpoint. The skill itself does not attempt to read sensitive local files or send data to arbitrary external servers. - Unverifiable Dependencies: The skill references Maven dependencies such as
com.azure:azure-monitor-opentelemetry-exporterandcom.azure:azure-monitor-opentelemetry-autoconfigure. These dependencies are from thecom.azuregroup, which is associated with theAzureGitHub organization (Microsoft), a recognized trusted source. Therefore, these references are considered low risk (INFO). - Privilege Escalation: No commands or instructions for privilege escalation (e.g.,
sudo,chmod 777, service installations) were found. - Persistence Mechanisms: No attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs) were detected. - Metadata Poisoning: The skill's metadata (name, description) is benign and accurately reflects its purpose. No hidden malicious instructions were found in metadata.
- Indirect Prompt Injection: As the skill provides code examples for an application, any application built using these examples that processes untrusted external input could theoretically be susceptible to indirect prompt injection. However, the skill itself does not introduce this vulnerability; it's a general risk for any code processing external data. This is noted as an informational risk for the user's application, not a direct threat from the skill.
- Time-Delayed / Conditional Attacks: No conditional logic based on dates, usage, or environment variables to trigger malicious behavior was found.
Overall, the skill is purely descriptive and provides code examples. It does not contain any executable components that the AI agent would run, and all external references are to trusted sources. Therefore, it is deemed safe.
Audit Metadata