ms365-tenant-manager
Audited by Socket on Feb 15, 2026
1 alert found:
Malware[Skill Scanner] Instruction directing agent to run/execute external content This skill manifest is consistent with a legitimate Microsoft 365 tenant administration tool: capabilities, required permissions, and dependencies align with the stated purpose. There is no direct evidence in the provided text of obfuscated code, hardcoded secrets, or non-Microsoft network endpoints. The main security concern is operational risk: scripts generated by this skill will perform high-impact tenant changes and require Global Administrator privileges — operators must review generated scripts, prefer -WhatIf/report-only modes, validate CSV inputs, and restrict who can run them. Because the actual generator code was not supplied, a final trust decision requires inspecting the scripts (powershell_generator.py, user_management.py, tenant_setup.py) to ensure they do not embed telemetry, exfiltrate data, or route API calls through third parties. Recommended: treat the package as high-impact but not currently malicious; perform code review on the generators and mandate safe execution practices. LLM verification: This SKILL.md describes high-privilege automation that is coherent with its stated purpose (Microsoft 365 tenant management). I found no direct evidence of malware or obfuscation in the provided documentation. The main security concerns are operational: generated PowerShell scripts perform powerful tenant-wide changes, and the examples include running scripts with confirmations disabled. Before trusting or executing generated scripts you should: (1) review the actual Python script implementation