ms-outlook-teams-assistant
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
scripts/scan_all.pyusessubprocess.runto dynamically execute other Python scripts (scan_outlook.pyandteams_scan.py). While these are internal skill files, the pattern of spawning child processes based on configuration parameters increases the risk of command injection if the configuration file is compromised. - [DATA_EXFILTRATION] (MEDIUM): The skill is designed to read private communications (subjects, sender info, and bodies) from Outlook and Teams to generate summaries for external transmission via Telegram. This capability grants the AI agent access to a user's entire local mailbox and chat history.
- [PROMPT_INJECTION] (LOW): The skill processes untrusted external data in the form of email bodies and subjects (Indirect Prompt Injection surface).
- Ingestion points:
scripts/scan_outlook.py(lines 142-143) andscripts/draft_reply.py(lines 92-98) ingest message subjects and bodies into variables. - Boundary markers: Absent. The code does not use delimiters or instructions to prevent the agent from obeying embedded commands within emails.
- Capability inventory: The skill possesses the ability to create Outlook drafts (
reply.Save()inscripts/draft_reply.py) and execute shell commands viasubprocess. - Sanitization: No sanitization or filtering is performed on the ingested email text before processing or summarizing.
- [REMOTE_CODE_EXECUTION] (SAFE): While the skill uses
subprocess.run, it targets locally defined scripts and does not appear to execute code directly from remote sources. The referencedteams_scan.py(not provided in the source) likely makes network calls to Microsoft Graph, which is considered intended functionality.
Audit Metadata