Skip to content
← Registry
Trust Report

distributed-tracing

Implement distributed tracing with Jaeger and Tempo to track requests across microservices and identify performance bottlenecks. Use when debugging microservices, analyzing request flows, or implementing observability for distributed systems.

82
SUSPICIOUS
Format: openclawScanner: v0.7.1Duration: 12msScanned: 1h ago · Apr 9, 5:04 AMSource →
Embed this badge
AgentVerus SUSPICIOUS 82AgentVerus SUSPICIOUS 82AgentVerus SUSPICIOUS 82
[![AgentVerus](https://agentverus.ai/api/v1/skill/a6f44514-fab4-45e9-9caa-c97c62c00f4c/badge)](https://agentverus.ai/skill/a6f44514-fab4-45e9-9caa-c97c62c00f4c)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/a6f44514-fab4-45e9-9caa-c97c62c00f4c/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"a6f44514-fab4-45e9-9caa-c97c62c00f4c","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/a6f44514-fab4-45e9-9caa-c97c62c00f4c/trust

Category Scores

78
Permissions
100
Injection
71
Dependencies
55
Behavioral
70
Content
100
Code Safety

Findings (10)

highCapability contract mismatch: inferred file read is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: references/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://github.com/jaegertracing/jaeger-operator/releases/download/v1.51.0/jaeger-operator.yaml

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred documentation ingestion is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: references/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highLocal file access detected (inside code block)-15

Found local file access pattern: "references/"

**Reference:** See `references/jaeger-setup.md`

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
highMany external URLs referenced (4)-8

The skill references 4 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://github.com/jaegertracing/jaeger-operator/releases/download/v1.51.0/jaeger-operator.yaml, http://elasticsearch:9200, http://jaeger:14268/api/traces, http://downstream-service/api

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
highLocal service access detected-15

Found local service access pattern: "(Express)"

#### Node.js (Express)

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03
highContainer runtime control detected-15

Found container runtime control pattern: "Docker Compose"

### Docker Compose

Treat Docker or container-runtime control as privileged host access. Scope container operations tightly, avoid arbitrary daemon access, and require explicit approval before mutating local workloads.

behavioralASST-03
mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

http://jaeger:14268/api/traces

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

http://elasticsearch:9200

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09