Office 365 Connector
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
This skill is classified as suspicious due to its broad and high-risk delegated permissions, including `Mail.ReadWrite`, `Mail.Send`, `Calendars.ReadWrite`, and `Contacts.ReadWrite`. While these permissions are explicitly declared in `SKILL.md` and `references/permissions.md` and are necessary for the skill's stated purpose as a comprehensive Office 365 connector, they grant extensive control over a user's email, calendar, and contacts. The skill demonstrates good security practices by storing credentials and tokens with restricted file permissions (0600) in `~/.openclaw/auth/` and communicating only with legitimate Microsoft OAuth and Graph API endpoints. There is no evidence of intentional malicious behavior, data exfiltration to unauthorized endpoints, or prompt injection attempts against the AI agent in the documentation.
