扫描报告
25 /100
officeclaw
Connect to personal Microsoft accounts via Microsoft Graph API to manage email, calendar events, and tasks
OfficeClaw is a legitimate Microsoft Graph API integration documented in SKILL.md with proper security controls (disabled-by-default writes, OAuth device flow, recipient allowlist). No malicious indicators in documentation; however, actual code resides in a PyPI package that cannot be audited from documentation alone.
可以安装
Install from PyPI as documented. Set OFFICECLAW_ALLOWED_RECIPIENTS before enabling sending. Prefer read-only scopes (Mail.Read, Calendars.Read) unless write access is needed.
安全发现 2 项
| 严重性 | 安全发现 | 位置 |
|---|---|---|
| 低危 | External PyPI package dependency not auditable 供应链 | SKILL.md:30 |
| 低危 | Pre-built Azure app registration referenced 文档欺骗 | SKILL.md:38 |
| 资源类型 | 声明权限 | 推断权限 | 状态 | 证据 |
|---|---|---|---|---|
| 命令执行 | WRITE | WRITE | ✓ 一致 | SKILL.md - CLI commands (officeclaw mail send, calendar create, etc.) |
| 网络访问 | READ | READ | ✓ 一致 | SKILL.md - Microsoft Graph API access to graph.microsoft.com |
| 文件系统 | READ | READ | ✓ 一致 | SKILL.md - Reads ~/.officeclaw/token_cache.json for auth tokens |
| 环境变量 | READ | READ | ✓ 一致 | SKILL.md - Reads OFFICECLAW_CLIENT_ID, OFFICECLAW_ENABLE_SEND from .env |
| 技能调用 | READ | READ | ✓ 一致 | SKILL.md - user-invocable skill with documented commands |
4 项发现
中危 外部 URL 外部 URL
https://learn.microsoft.com/en-us/entra/identity-platform/quickstart-register-app SKILL.md:46 中危 外部 URL 外部 URL
https://entra.microsoft.com SKILL.md:50 中危 外部 URL 外部 URL
https://docs.microsoft.com/graph/ SKILL.md:237 中危 外部 URL 外部 URL
https://docs.openclaw.ai SKILL.md:238 目录结构
1 文件 · 9.5 KB · 238 行 Markdown 1f · 238L
└─
SKILL.md
Markdown
依赖分析 2 项
| 包名 | 版本 | 来源 | 已知漏洞 | 备注 |
|---|---|---|---|---|
officeclaw | 1.0.4 | pypi | 否 | PyPI package — actual code not present in skill directory for review |
graph.microsoft.com | API | network | 否 | Official Microsoft Graph API endpoint — expected traffic |
安全亮点
✓ Write operations (send, delete) are disabled by default — prevents accidental actions
✓ Recipient allowlist (OFFICECLAW_ALLOWED_RECIPIENTS) provides hard boundary against unauthorized email delivery
✓ Uses OAuth 2.0 device code flow — no client secrets stored, standard authentication
✓ Tokens stored with 600 file permissions in ~/.officeclaw/
✓ Least-privilege permissions model — read-only scopes are sufficient for most use cases
✓ No telemetry or data collection mentioned in documentation
✓ No hardcoded credentials or API keys in documentation
✓ Well-structured documentation with clear security guidance
✓ Blocks are logged to email-blocked.log for audit trail