office365-connector
Pass
Audited by Gen Agent Trust Hub on Feb 12, 2026
Risk Level: LOW
Full Analysis
The skill consists of several Node.js scripts and markdown documentation. A thorough analysis of all files was conducted, focusing on the 9 threat categories.
- Prompt Injection: No patterns indicative of prompt injection were found in any of the markdown files or JavaScript code.
- Data Exfiltration: The skill handles sensitive data such as Azure client secrets and OAuth tokens. These are stored locally in
~/.openclaw/auth/office365-accounts.jsonand~/.openclaw/auth/office365/*.json. The skill explicitly sets secure file permissions (0o600 for files, 0o700 for directories) for these sensitive files, which is a strong security practice. All network communications are directed to trusted Microsoft domains (login.microsoftonline.com,graph.microsoft.com) for authentication and API interactions. No attempts to exfiltrate data to untrusted external domains were detected. - Obfuscation: No obfuscation techniques (e.g., Base64 encoding, zero-width characters, homoglyphs, URL/hex/HTML encoding) were found in any part of the skill's code or documentation.
- Unverifiable Dependencies: All
require()statements in the JavaScript files are for built-in Node.js modules (fs,path,https,url) or local files within the skill's directory (./accounts.js,./auth.js, etc.). There are no external package installations (npm install,pip install) executed by the skill itself, nor are there references to unverified external scripts or URLs. References to GitHub and Microsoft documentation are from trusted sources. - Privilege Escalation: No commands or code patterns (e.g.,
sudo,chmod +xon arbitrary files, modification of system files) that would attempt to escalate privileges were found. The use ofchmod 0o600and0o700is for securing the skill's own configuration, which is a security hardening measure. - Persistence Mechanisms: The skill stores account configurations and authentication tokens in the user's
~/.openclaw/auth/directory. This is for the legitimate functional persistence of the skill (to maintain user authentication across sessions) and does not constitute a malicious persistence mechanism to maintain unauthorized access. - Metadata Poisoning: The
_meta.jsonfile and thename/descriptionfields inSKILL.md, along with other documentation, were checked for malicious instructions. No such patterns were found. - Indirect Prompt Injection: The skill is designed to process external content (emails, calendar events) from the user's Microsoft 365 account. As with any skill that interacts with external user-generated data, there is an inherent risk of indirect prompt injection if the processed content contains malicious instructions. The skill's documentation (
references/permissions.md) appropriately details the permissions requested and the data accessed, providing transparency to the user about these interactions. This is an informational risk inherent to the skill's function, not a vulnerability in its implementation. - Time-Delayed / Conditional Attacks: No suspicious conditional logic (e.g., based on specific dates, usage counts, or environment variables) designed to trigger malicious behavior at a later time was detected. Date checks are used legitimately for token expiration management.
Audit Metadata