ms365-tenant-manager
Pass
Audited by Gen Agent Trust Hub on Apr 3, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The Python scripts
scripts/powershell_generator.pyandscripts/user_management.pygenerate PowerShell code by interpolating data from external CSV files directly into string templates without sanitization. InUserLifecycleManager.generate_user_creation_script, user-supplied fields likedisplay_nameanddepartmentare placed inside PowerShell string literals without escaping double quotes. An attacker could provide a crafted CSV file that uses quote-breaking sequences to inject and execute arbitrary PowerShell commands with the high privileges of a Global Administrator. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through its CSV ingestion process. Ingestion points: External CSV files containing user provisioning data are processed by
scripts/user_management.py. Boundary markers: Absent; the skill does not use delimiters to isolate untrusted data from the generated command logic. Capability inventory: The skill generates scripts that perform sensitive operations including user creation, license assignment, and security policy modification via Microsoft Graph APIs. Sanitization: Absent; no input validation or escaping is implemented to prevent malicious payloads in the CSV from influencing the generated script's behavior.
Audit Metadata