outlook-emails-lawvable
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: Interacts with the Microsoft Graph API to retrieve email metadata and attachments.
- Evidence: The script
scripts/outlook_oauth.pymakes network requests tograph.microsoft.comto fetch user messages and file attachments. - [CREDENTIALS_UNSAFE]: Uses a hardcoded Azure Client ID for authentication.
- Evidence:
scripts/outlook_oauth.pycontains the variableCLIENT_IDset toebaa3d3e-7da3-46ea-8845-c7db6dbae8f0. This ID is associated with the author's 'Lawvable' application, though users can override it with their own credentials via environment variables. - [PROMPT_INJECTION]: Potential for indirect prompt injection from processing external email data.
- Ingestion points:
scripts/outlook_oauth.pyreads content from email bodies and attachments from Microsoft's servers, which are untrusted external sources. - Boundary markers: Absent. There are no explicit delimiters or instructions provided to the agent to ignore commands within the fetched email data.
- Capability inventory: The skill can download files to the local filesystem (
./attachments) and its output is intended to be used as input for other agent skills, increasing the risk of multi-step chains. - Sanitization: Absent. The content of emails and attachments is not sanitized or validated for malicious instructions before being presented to the agent.
Audit Metadata