Outlook Delegate

Read, search, and manage Outlook emails and calendar via Microsoft Graph API with delegate support. Supports sending as self, as owner (Send As), and on behalf of owner (Send on Behalf). Modified for delegate access from https://clawhub.ai/jotamed/outlook

MIT-0 · Free to use, modify, and redistribute. No attribution required.
4 · 689 · 3 current installs · 3 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The name/description align with the included scripts: they call Microsoft Graph and Exchange to read/write mail and calendars as a delegate. However the registry metadata claims no required config/credentials, while the runtime expects ~/.outlook-mcp/config.json and credentials.json containing client_id, client_secret, tenant_id, owner_email, delegate_email, and refresh/access tokens. That mismatch (metadata vs actual requirements) is an incoherence.
Instruction Scope
SKILL.md and references/setup.md give detailed OAuth and Exchange PowerShell steps; runtime scripts only interact with Microsoft endpoints (graph.microsoft.com, login.microsoftonline.com) and local config files. The instructions require running admin PowerShell commands to grant FullAccess and SendAs/SendOnBehalf — these are high-privilege operations but are coherent with the skill's purpose. No unexpected external endpoints or obfuscated network calls were found.
Install Mechanism
No install spec; code is delivered as shell scripts and docs. This reduces supply-chain risk vs downloading arbitrary binaries. The scripts use standard tools (curl, jq) and write to a per-user config directory. Nothing in the install story downloads third-party code from unknown hosts.
!
Credentials
The skill requires highly sensitive secrets (client_secret, refresh/access tokens) and tenant/admin consent for delegated permissions, but the registry metadata lists no required env vars or config paths. The scope requested (Full Mailbox Access, Mail.Send.Shared, Mail.ReadWrite.Shared, Calendars.ReadWrite.Shared) is broad but functionally justified for full delegate mailbox/calendar management — still, these privileges are powerful and should only be granted to a trusted assistant account. The omission in declared required credentials/config in metadata is the primary proportionality issue.
Persistence & Privilege
The skill stores credentials and config under ~/.outlook-mcp and enforces permissive file modes (chmod 700/600) in scripts. always:false and no modifications to other skills or global agent settings were detected. Persisting OAuth credentials locally is expected for this workflow, but it creates persistent access until tokens are revoked.
What to consider before installing
This skill appears to implement delegate Outlook access as described, but it requires you to create and store sensitive credentials (client_id/client_secret/refresh tokens) in ~/.outlook-mcp and to grant high-privilege Exchange permissions (FullAccess and either SendAs or SendOnBehalf). Before installing: 1) Review the scripts yourself (they call only Microsoft endpoints) and confirm you trust the source. 2) Do not grant both SendAs and SendOnBehalf — pick one per the docs. 3) Use a dedicated, limited 'assistant' account (not an admin or personal account). 4) Limit client secret lifetime, rotate credentials, and monitor mailbox/audit logs. 5) Because the registry metadata omits the required config/credentials, ask the maintainer to update metadata to explicitly declare the config path and secrets required. If you are not comfortable granting Full Mailbox Access or handling OAuth secrets, do not install/use this skill.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.1.1
Download zip
latestvk9773hmy34zaxn0k09qhbex6ns8137vv

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Outlook Delegate Skill

Access another user's Outlook/Microsoft 365 email and calendar as a delegate via Microsoft Graph API. Supports three sending modes: as yourself, as the owner, or on behalf of the owner.

Delegate Architecture

This skill is designed for scenarios where:

  • Your AI assistant (the delegate) has its own Microsoft 365 account
  • The owner has granted the assistant delegate access to their mailbox/calendar
  • The assistant can send emails as itself, as the owner, or on behalf of the owner

Sending Modes Explained

All three modes use the same Graph API call (/users/{delegate}/sendMail with the from field set). The difference between Send As and Send on Behalf is determined entirely by which Exchange permission is granted, not by the API endpoint.

ModeCommandExchange Permission Requiredfrom fieldsender fieldWhat Recipient Sees
As Selfsend(none extra)DelegateDelegate"From: Assistant"
As Owner (Send As)send-asSendAs onlyOwnerOwner"From: Owner"
On Behalf Ofsend-behalfSendOnBehalf onlyOwnerDelegate"From: Assistant on behalf of Owner"

⚠️ CRITICAL: Do NOT grant both SendAs and SendOnBehalf permissions. If both are granted, Exchange always uses SendAs, and the "on behalf of" indication will never appear. Choose ONE based on your desired behavior.

How It Works Under the Hood

When you call send-as or send-behalf, the skill makes the same API call: it sends via the delegate's endpoint with the owner in the from field. Microsoft Graph automatically sets the sender property to the authenticated user (the delegate). Whether the recipient sees "on behalf of" depends solely on the Exchange permission:

  • SendAs permission → Graph sets both sender and from to the owner. No indication of delegation.
  • SendOnBehalf permission → Graph keeps sender as the delegate and from as the owner. Recipient sees "on behalf of."

Configuration

Config File: ~/.outlook-mcp/config.json

{
  "client_id": "your-app-client-id",
  "client_secret": "your-app-client-secret",
  "tenant_id": "your-tenant-id",
  "owner_email": "owner@yourdomain.com",
  "owner_name": "Owner Display Name",
  "delegate_email": "assistant@yourdomain.com",
  "delegate_name": "AI Assistant",
  "timezone": "America/New_York"
}
FieldDescription
client_idMicrosoft Entra ID App Registration client ID
client_secretMicrosoft Entra ID App Registration client secret
tenant_idYour Microsoft Entra tenant ID (auto-detected during setup)
owner_emailThe mailbox the assistant accesses as delegate
owner_nameDisplay name for the owner (used in From field)
delegate_emailThe assistant's own email address
delegate_nameDisplay name for the assistant
timezoneIANA timezone for calendar operations (e.g., America/New_York, Europe/London, UTC)

Setup Requirements

1. Microsoft Entra ID App Registration

Create an app registration in Azure Portal:

  1. Go to portal.azure.com → Microsoft Entra ID → App registrations
  2. New registration:
    • Name: "AI Assistant Mail Access"
    • Supported account types: "Accounts in this organizational directory only" (single tenant)
    • Redirect URI: http://localhost:8400/callback
  3. Note the Application (client) ID and Directory (tenant) ID

2. Configure API Permissions

In your app → API permissions → Add a permission → Microsoft Graph → Delegated permissions:

Required for all modes:

  • Mail.ReadWrite — Read/write assistant's own mail
  • Mail.Send — Send mail as assistant
  • Calendars.ReadWrite — Read/write calendars
  • User.Read — Read own profile
  • offline_access — Refresh tokens

Required for delegate access:

  • Mail.ReadWrite.Shared — Read/write shared mailboxes
  • Mail.Send.Shared — Send on behalf of others
  • Calendars.ReadWrite.Shared — Read/write shared calendars

Click "Grant admin consent" (requires admin).

3. Create Client Secret

  1. Certificates & secrets → New client secret
  2. Description: "AI Assistant"
  3. Expiration: Choose appropriate duration
  4. Copy the Value immediately (shown only once)

4. Grant Exchange Delegate Permissions

The owner (or an admin) must grant the assistant access via PowerShell.

Choose your sending mode FIRST, then grant the appropriate permissions:

# Connect to Exchange Online
Install-Module -Name ExchangeOnlineManagement
Connect-ExchangeOnline -UserPrincipalName admin@yourdomain.com

# REQUIRED: Full Mailbox Access (for reading owner's mail)
Add-MailboxPermission -Identity "owner@yourdomain.com" `
    -User "assistant@yourdomain.com" `
    -AccessRights FullAccess `
    -InheritanceType All `
    -AutoMapping $false

# REQUIRED: Calendar Delegate Access
Add-MailboxFolderPermission -Identity "owner@yourdomain.com:\Calendar" `
    -User "assistant@yourdomain.com" `
    -AccessRights Editor `
    -SharingPermissionFlags Delegate

Then choose ONE of the following — do NOT grant both:

# OPTION A: Send As (emails appear directly from owner, no indication)
Add-RecipientPermission -Identity "owner@yourdomain.com" `
    -Trustee "assistant@yourdomain.com" `
    -AccessRights SendAs `
    -Confirm:$false
# OPTION B: Send on Behalf (emails show "assistant on behalf of owner")
Set-Mailbox -Identity "owner@yourdomain.com" `
    -GrantSendOnBehalfTo "assistant@yourdomain.com"

Verify permissions:

# Check mailbox permissions
Get-MailboxPermission -Identity "owner@yourdomain.com" | Where-Object {$_.User -like "*assistant*"}

# Check Send As
Get-RecipientPermission -Identity "owner@yourdomain.com" | Where-Object {$_.Trustee -like "*assistant*"}

# Check Send on Behalf
Get-Mailbox "owner@yourdomain.com" | Select-Object GrantSendOnBehalfTo

# Check Calendar permissions
Get-MailboxFolderPermission -Identity "owner@yourdomain.com:\Calendar"

5. Permissions Summary

ActionGraph PermissionExchange Permission
Read owner's mailMail.ReadWrite.SharedFullAccess
Send as selfMail.Send(none needed)
Send as ownerMail.Send.SharedSendAs only
Send on behalf of ownerMail.Send.SharedSendOnBehalf only
Read/write owner's calendarCalendars.ReadWrite.SharedEditor

Usage

Token Management

./scripts/outlook-token.sh refresh   # Refresh expired token
./scripts/outlook-token.sh test      # Test connection to both accounts
./scripts/outlook-token.sh get       # Print access token
./scripts/outlook-token.sh info      # Show configuration info

Reading Owner's Emails

./scripts/outlook-mail.sh inbox [count]           # Owner's inbox
./scripts/outlook-mail.sh unread [count]          # Owner's unread
./scripts/outlook-mail.sh search "query" [count]  # Search owner's mail
./scripts/outlook-mail.sh from <email> [count]    # Owner's mail from sender
./scripts/outlook-mail.sh read <id>               # Read email content
./scripts/outlook-mail.sh attachments <id>        # List attachments

Managing Owner's Emails

./scripts/outlook-mail.sh mark-read <id>          # Mark as read
./scripts/outlook-mail.sh mark-unread <id>        # Mark as unread
./scripts/outlook-mail.sh flag <id>               # Flag as important
./scripts/outlook-mail.sh unflag <id>             # Remove flag
./scripts/outlook-mail.sh delete <id>             # Move to trash
./scripts/outlook-mail.sh archive <id>            # Move to archive
./scripts/outlook-mail.sh move <id> <folder>      # Move to folder

Sending Emails

As Assistant (self):

./scripts/outlook-mail.sh send <to> <subject> <body>
./scripts/outlook-mail.sh reply <id> "body"
./scripts/outlook-mail.sh forward <id> <to> [message]

Recipient sees: "From: AI Assistant assistant@domain.com"

As Owner (Send As — requires SendAs permission, no indication):

./scripts/outlook-mail.sh send-as <to> <subject> <body>
./scripts/outlook-mail.sh reply-as <id> "body"
./scripts/outlook-mail.sh forward-as <id> <to> [message]

Recipient sees: "From: Owner owner@domain.com"

On Behalf of Owner (requires SendOnBehalf permission):

./scripts/outlook-mail.sh send-behalf <to> <subject> <body>
./scripts/outlook-mail.sh reply-behalf <id> "body"
./scripts/outlook-mail.sh forward-behalf <id> <to> [message]

Recipient sees: "From: AI Assistant on behalf of Owner owner@domain.com"

Drafts

./scripts/outlook-mail.sh draft <to> <subject> <body>  # Create draft in owner's mailbox
./scripts/outlook-mail.sh drafts [count]               # List owner's drafts
./scripts/outlook-mail.sh send-draft <id>              # Send draft as self
./scripts/outlook-mail.sh send-draft-as <id>           # Send draft as owner
./scripts/outlook-mail.sh send-draft-behalf <id>       # Send draft on behalf of owner

Folders & Stats

./scripts/outlook-mail.sh folders                 # List mail folders
./scripts/outlook-mail.sh stats                   # Inbox statistics
./scripts/outlook-mail.sh whoami                  # Show delegate info

Calendar

Viewing Events:

./scripts/outlook-calendar.sh events [count]      # Owner's upcoming events (future only)
./scripts/outlook-calendar.sh today               # Today's events (timezone-aware)
./scripts/outlook-calendar.sh week                # This week's events
./scripts/outlook-calendar.sh read <id>           # Event details
./scripts/outlook-calendar.sh calendars           # List all calendars
./scripts/outlook-calendar.sh free <start> <end>  # Check availability

Creating Events:

./scripts/outlook-calendar.sh create <subject> <start> <end> [location]
./scripts/outlook-calendar.sh quick <subject> [time]

Date format: YYYY-MM-DDTHH:MM (e.g., 2026-01-26T10:00)

Managing Events:

./scripts/outlook-calendar.sh update <id> <field> <value>
./scripts/outlook-calendar.sh delete <id>

Fields: subject, location, start, end

Sent Items Behavior

Where the sent copy is saved depends on the endpoint used, not the sending mode:

CommandEndpoint UsedSaved To
send (as self)/users/{delegate}/sendMailDelegate's Sent Items
send-as/users/{delegate}/sendMailDelegate's Sent Items *
send-behalf/users/{delegate}/sendMailDelegate's Sent Items *
All draft sends/users/{owner}/messages/{id}/sendOwner's Sent Items

* Administrators can configure Exchange to also save a copy in the owner's Sent Items using:

Set-Mailbox -Identity "owner@yourdomain.com" -MessageCopyForSentAsEnabled $true -MessageCopyForSendOnBehalfEnabled $true

Troubleshooting

"Access denied" or "403 Forbidden" → Check that the assistant has MailboxPermission on the owner's mailbox

"ErrorSendAsDenied" → Missing SendAs or SendOnBehalf permission. Run the PowerShell commands above.

Emails don't show "on behalf of" → You may have both SendAs and SendOnBehalf granted. When both exist, Exchange always uses SendAs (which hides the delegate). Remove the SendAs permission if you want "on behalf of" to appear.

"The mailbox is not found" → Verify owner_email in config.json is correct

"AADSTS90002: Tenant not found" → Check tenant_id in config.json matches your Microsoft Entra tenant

"Token expired" → Run outlook-token.sh refresh

Wrong timezone for calendar → Update timezone in config.json (use IANA format like America/New_York)

Security Considerations

  1. Credential Protection: The ~/.outlook-mcp/ directory is automatically set to 700 and credential files to 600
  2. No Process Leaks: Token refresh and exchange operations pass secrets via stdin, not command-line arguments
  3. Input Sanitization: All user input is JSON-escaped via jq to prevent injection
  4. Audit Trail: All actions are logged in the owner's mailbox audit log
  5. Scope Limitation: The assistant only has access to what's explicitly granted
  6. Revocation: Owner can revoke access via Exchange PowerShell or Outlook settings

Revoking Access

# Remove all permissions
Remove-MailboxPermission -Identity "owner@yourdomain.com" -User "assistant@yourdomain.com" -AccessRights FullAccess -Confirm:$false

# Remove Send As (if granted)
Remove-RecipientPermission -Identity "owner@yourdomain.com" -Trustee "assistant@yourdomain.com" -AccessRights SendAs -Confirm:$false

# Remove Send on Behalf (if granted)
Set-Mailbox -Identity "owner@yourdomain.com" -GrantSendOnBehalfTo @{Remove="assistant@yourdomain.com"}

# Remove Calendar access
Remove-MailboxFolderPermission -Identity "owner@yourdomain.com:\Calendar" -User "assistant@yourdomain.com" -Confirm:$false

Files

  • ~/.outlook-mcp/config.json — Configuration (client ID, tenant ID, emails, timezone)
  • ~/.outlook-mcp/credentials.json — OAuth tokens (access + refresh)

Changelog

v1.1.0

  • FIXED: Reply command no longer sends duplicate emails (removed dead code that sent a garbage email)
  • FIXED: All reply/forward variants now use proper Graph API threading (createReply/createForward → patch from → send)
  • FIXED: send-as and send-behalf now correctly documented — behavior depends on Exchange permissions, not API endpoint
  • FIXED: send-draft-behalf no longer deletes draft before sending (prevents data loss on send failure)
  • FIXED: All user input is now JSON-escaped via jq to prevent injection and malformed payloads
  • FIXED: Credentials file permissions enforced on every write (chmod 600)
  • FIXED: Config directory permissions enforced (chmod 700)
  • FIXED: Client secrets no longer visible in process list (sent via stdin)
  • FIXED: Calendar events command now shows only future events
  • FIXED: Sent Items behavior documented accurately
  • FIXED: Version number corrected
  • Updated Microsoft Entra ID naming (formerly Azure Active Directory)
  • Setup guide now explicitly warns against granting both SendAs and SendOnBehalf
  • Revocation commands updated (GrantSendOnBehalfTo uses @{Remove=...} syntax)

v1.0.0

  • Three sending modes: as self, as owner (Send As), on behalf of owner
  • Tenant-specific authentication (no /common endpoint)
  • Configurable timezone for calendar operations
  • Display names for owner and delegate
  • Drafts saved to owner's mailbox
  • Comprehensive PowerShell setup commands
  • Based on outlook v1.3.0 by jotamed (https://clawhub.ai/jotamed/outlook)

Files

6 total
Select a file
Select a file to preview.

Comments

Loading comments…