So being that Trend Micro is in bed with the CIA vis a vis Booz Allen Hamilton, a reknown Cyber company, which AV vendor would you recommend which is least likely to be exploited by our own intelligence agencies? Kaspersky is still recommended by many but there is the Russian debacle. and according to the TM Forum link, I quoted, all the AV can be exploited. What is left?
The bane of AV exploitation is patching. Stagnation is loved by the agencies doing exploitation because it means code changes are only needed at rare, predictable intervals. Your question has a lot of open ended answers and is a complex thing to answer. Telemetry and logging can be exploited, so you may want to consider solutions that have little to no telemetry and log transmissions. Bullguard, Emsisoft, FortiClient. F-Prot and Gdata come to mind as ones known to be private/quiet. I'm sure there are some others that are pretty quiet. F-Secure is pretty good in this area too.
I guarantee you FortiClient sends NO data with logging and telemetry boxes unchecked. But don't trust me on this, check the activity yourself if you don't believe me. But that doesn't mean I think FortiClient is your best solution, just saying - and it's used in many secure environments where egress of data can't be tolerated - that's why the checkbox is there.
I guess to answer your question, maybe look for regularly updated products, low amounts of telemetry/logging or options to turn it off. Then examine privacy and company policies and go from there. It is quite possible you can still be exploited, but it would become much harder if the product simply doesn't send any logs or telemetry. Threat actors would have their work cut out for them modifying the program to do something it's just not capable of doing and would probably require a secondary payload to work, which may be detected by your security protocols, further increasing their risk. (and making you not worth it)