Outlook-email

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user would be trusting external, unreviewed code to access their Outlook mailbox and perform send/read actions.

Why it was flagged

The reviewed package has no `outlook` script or install spec, so the executable that would handle credentials and email actions is fetched outside the reviewed artifacts.

Skill content
git clone https://github.com/abhiramee08b021/outlook-cli.git
cd outlook-cli
Recommendation

Include the CLI code in the skill package or pin a reviewed commit; users should inspect the GitHub repository before running it.

What this means

If these stored credentials are mishandled or compromised, they could enable continued access to read or send Outlook email.

Why it was flagged

The tool stores sensitive OAuth material for mailbox access; the registry metadata declares no primary credential or required config path, and the implementation is not present for review.

Skill content
config.json - Client ID and secret
- `tokens.json` - OAuth tokens (auto-generated)
Recommendation

Use a dedicated Azure app registration, verify the requested Microsoft Graph scopes, protect `~/.config/outlook-cli/`, and revoke/remove tokens when no longer needed.

What this means

An accidental or poorly reviewed send/reply command could email the wrong recipients or send unintended content.

Why it was flagged

Sending and replying are core email-client features, but they mutate a real account and can affect other people.

Skill content
`outlook send --to ...` | Send email |
| `outlook reply <id>` | Reply to email |
Recommendation

Review recipients, message body, and reply-all behavior before allowing the agent to send or reply.