m365-admin

PassAudited by VirusTotal on May 3, 2026.

Overview

Type: OpenClaw Skill Name: ah-m365-admin Version: 1.0.0 The skill bundle consists of metadata and a markdown file (SKILL.md) defining a persona for Microsoft 365 administration. It contains no executable code, scripts, or instructions that suggest malicious intent, data exfiltration, or unauthorized access. The content is entirely focused on standard IT operations such as Exchange Online management, SharePoint automation, and Graph API licensing workflows.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mis-scoped automation could change mailbox, Teams, SharePoint, or licensing settings for many users.

Why it was flagged

Bulk Microsoft 365 administrative changes are purpose-aligned for this skill, but they can affect many accounts or resources if executed without tight scoping and review.

Skill content
“Bulk update mailbox settings across departments”
Recommendation

Use read-only audits first, define the exact target set, require user approval before changes, and keep a rollback plan for bulk operations.

What this means

If granted excessive admin rights, commands produced under this skill could alter tenant permissions, app access, or identity configuration.

Why it was flagged

The skill covers privileged Microsoft 365 identity and application administration. This matches its purpose, and no credential collection or hidden token handling is shown.

Skill content
“Use Microsoft Graph PowerShell for identity and workload automation” and “Manage service principals, apps, roles”
Recommendation

Use least-privilege Microsoft 365 roles, avoid broad tenant-wide consent unless necessary, and review all Graph or Exchange commands before running them.