office secretary
Analysis
This appears to be a real Microsoft 365 assistant, but it needs review because it requests broad delegated account permissions, can modify mail and send Teams messages, and stores login tokens locally.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
self.call("PATCH", f"me/messages/{m['id']}", {"categories": ["Urgent"]}) ... self.call("POST", f"teams/{team_id}/channels/{channel_id}/messages", {"body": {"content": msg}})The code directly changes mailbox message categories and posts Teams messages, with no built-in confirmation or preview step shown in the artifacts.
msal requests python-dotenv
The Python dependencies are listed without pinned versions, so future installs may resolve to different package versions.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
REQUIRED_SCOPES = [ 'User.Read', 'Mail.ReadWrite', 'Calendars.ReadWrite', 'Files.ReadWrite', 'ChatMessage.Send' ]
The skill requests delegated Microsoft Graph permissions that can read and modify mail, calendars, and files, and send Teams chat messages.
CACHE_PATH = os.path.join(BASE_DIR, 'token_cache.bin') ... f.write(self.cache.serialize())
The skill stores a local MSAL token cache so it can reuse Microsoft authentication across runs; the code attempts to restrict file permissions, but the cache still represents persistent delegated access.
