telnyx-sip-java
Pass
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references the official Telnyx Java SDK (
com.telnyx.sdk:telnyx-java:6.26.0) for installation via Maven or Gradle. This is a trusted vendor resource provided by the author. - [SAFE]: Sensitive configuration practices are encouraged by demonstrating the use of environment variables (
TelnyxOkHttpClient.fromEnv()) for initializing the API client. - [SAFE]: Hardcoded values in the code snippets, such as credentials (
my123secure456password789) and IP addresses (192.168.0.0), are used purely as demonstration placeholders. - [PROMPT_INJECTION]: The skill defines a surface for indirect prompt injection as it processes untrusted data that could be influenced by an attacker.
- Ingestion points: Untrusted inputs include
cidr_block,connection_name,user_name,fqdn, andip_addressacross various creation and update operations inSKILL.md. - Boundary markers: No specific delimiters or instructions to ignore embedded commands are present in the provided examples.
- Capability inventory: The skill allows for the creation, modification, and deletion of SIP infrastructure components (IP ranges, FQDNs, and voice profiles) via the Telnyx API as documented in
SKILL.md. - Sanitization: No explicit sanitization, validation, or escaping logic for user-supplied strings is shown in the instructional examples.
Audit Metadata