skills/mukul975/anthropic-cybersecurity-skills/analyzing-office365-audit-logs-for-compromise/Gen Agent Trust Hub
analyzing-office365-audit-logs-for-compromise
Pass
Audited by Gen Agent Trust Hub on Mar 15, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script communicates with
graph.microsoft.comandlogin.microsoftonline.comto fetch audit logs and mailbox settings. These are well-known, trusted Microsoft service domains required for the skill's functionality. - [COMMAND_EXECUTION]: The skill is implemented as a Python script using standard logic. It does not utilize dangerous functions such as
eval(),exec(), orsubprocessto execute dynamic commands. - [CREDENTIALS_UNSAFE]: The tool requires Azure AD credentials (client secret) as command-line arguments for authentication. While no secrets are hardcoded in the skill, users are advised to manage these secrets securely using environment variables or secret managers to prevent exposure in shell histories.
- [PROMPT_INJECTION]: The skill processes untrusted external data such as mailbox rule names and audit log details. This represents a potential surface for indirect prompt injection if the output is processed by an LLM without proper sanitization or boundary markers. However, no evidence of malicious intent or behavior was found in the skill's own code or instructions.
Audit Metadata