Microsoft To Do
Analysis
This is a coherent Microsoft To Do skill, but it should be reviewed because it can delete tasks or lists while bypassing confirmations and uses local Microsoft OAuth credentials.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
- **Always use `-y`** with `rm` commands to skip confirmation
This makes the no-confirmation path the default for destructive delete commands, including task and list removal.
uv | package: microsoft-todo-cli | creates binaries: todo
The skill's runtime behavior depends on an external package rather than bundled code in the submitted artifacts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Add your credentials to `~/.config/microsoft-todo-cli/keys.yml`: client_id: "your-application-client-id" client_secret: "your-client-secret-value"
The skill requires Microsoft app credentials and an OAuth flow to access the user's Microsoft To Do account.
