m365cli
Analysis
This is a coherent Microsoft 365 management skill, but it needs careful review because it grants broad work-account access and documents forceful changes to corporate mail, files, calendar, and SharePoint data.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
**Deleting emails/files/events**: Inform the user before executing. ... `m365 mail delete <id> --force --json` ... `m365 od rm "old-file.txt" --force --json`
The skill documents destructive account operations and shows examples that skip CLI confirmation; merely informing the user is weaker than requiring explicit approval.
Only emails from whitelisted senders have their body content displayed. ... Use `--force` to temporarily bypass ... `m365 mail read <id> --force --json`
The skill acknowledges email-body prompt-injection risk, but the quick read example bypasses the sender whitelist by default.
install: npm install -g m365-cli ... Package: `https://www.npmjs.com/package/m365-cli` ... Publisher: `mrhah`
The skill depends on a globally installed external npm CLI package; this is central to the stated purpose, but the artifact does not pin a package version.
Required binaries (all must exist): none ... Primary credential: none ... No install spec — this is an instruction-only skill.
The registry metadata does not declare the m365 binary, npm install step, or Microsoft login that the SKILL.md itself requires.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Work account default scopes: `Mail.ReadWrite`, `Mail.Send`, `Calendars.ReadWrite`, ... `Files.ReadWrite`, ... `offline_access` ... SharePoint scope ... `Sites.ReadWrite.All`
The documented Microsoft 365 permissions allow broad delegated read/write access, mail sending, persistent refresh, and optional tenant-wide SharePoint read/write access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Whitelist file: `~/.m365-cli/trusted-senders.txt` ... `m365 mail trust @example.com`
The skill uses persistent trust state that can cause future email bodies, including an entire trusted domain, to be shown to the agent.
