Power Platform Custom Connector

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only skill appears purpose-aligned for building Power Platform connectors, but it legitimately involves credentials, generated custom code, external validation scripts, and publishing workflows that users should review.

This skill is reasonable to use for Power Platform connector development. Before using it with real projects, review generated apiDefinition.swagger.json, apiProperties.json, readme.md, and script.csx files; keep real secrets out of committed files and chat when possible; run external validator scripts only after verifying the source; ensure SAS URLs expire; and include webhook cleanup logic for trigger connectors.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

64/64 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If secrets or SAS URLs are shared in the wrong place, someone else could access connector packages or OAuth app credentials.

Why it was flagged

The certification workflow can involve OAuth client secrets and package-access URLs. This is expected for verified connector submission, but it is sensitive account authority.

Skill content
- Provide the SAS URL, Client ID, and Client Secret (for OAuth connectors)
Recommendation

Use placeholders in generated files, do not paste real secrets into chat unless necessary, and submit real client secrets only through official Microsoft portals or secure credential fields.

What this means

Running external scripts can modify files or run commands in the local environment if the script source is compromised or not what the user expected.

Why it was flagged

The workflow instructs users to download and run a validator script from a GitHub branch. It is from the expected Microsoft connector repository and is user-directed, but it is still external script execution.

Skill content
# Download and run the ConnectorPackageValidator ... https://github.com/microsoft/PowerPlatformConnectors/blob/dev/scripts/ConnectorPackageValidator.ps1 ... .\ConnectorPackageValidator.ps1 -PackagePath .\package.zip
Recommendation

Download validator scripts only from the official Microsoft repository, inspect them before running, and prefer a pinned or reviewed version when possible.

What this means

Generated connector code can affect what data is sent to backend APIs and how responses are transformed.

Why it was flagged

The skill may help generate C# custom connector code that executes in the Power Platform connector runtime and can send or transform HTTP requests. This is a core disclosed capability.

Skill content
| External data fetching during request | **Custom code** | ... return await this.Context.SendAsync(this.Context.Request, this.CancellationToken)
Recommendation

Review any generated script.csx before deployment, keep it limited to the intended API behavior, and avoid adding unrelated network calls or secret logging.

What this means

A poorly designed webhook connector could continue sending events after a flow is changed or removed.

Why it was flagged

Webhook trigger connectors can create persistent external subscriptions. The documentation recognizes the persistence risk and gives cleanup guidance.

Skill content
Webhooks are never cleaned up when flows are deleted or modified, leading to orphaned webhooks on the external service. Fix: Define a DELETE operation for the webhook path.
Recommendation

Include and test webhook deletion/cleanup operations so external webhooks are removed when flows are deleted or updated.