ToolTrust
C25/100
Softeria

ms-365-mcp-server

mcp0.45.2

@Softeria

A Model Context Protocol (MCP) server for interacting with Microsoft 365 and Office services through the Graph API

By Softeria | 31 findings | Scanned 3/22/2026 | tooltrust-scanner/v0.1.15

9 High12 Medium10 Low

Security Findings (31)

  • HighExcessive Permission Surface ×9
    • DYNAMICS365_DYNAMICSCRM_CREATE_ACCOUNT:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_CASE:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_INVOICE:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_OPPORTUNITY:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_SALES_ORDER:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_CASE:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_INVOICE:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_OPPORTUNITY:tool declares exec permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_SALES_ORDER:tool declares exec permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • MediumExcessive Permission Surface ×12
    • DYNAMICS365_DYNAMICSCRM_CREATE_ACCOUNT:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_CASE:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_CONTACT:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_INVOICE:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_LEAD:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_OPPORTUNITY:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_CREATE_SALES_ORDER:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_CASE:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_INVOICE:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_LEAD:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_OPPORTUNITY:tool declares fs permission
    • DYNAMICS365_DYNAMICSCRM_UPDATE_SALES_ORDER:tool declares fs permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.
  • LowDoS Resilience — Missing Rate Limit / Timeout ×9
    • DYNAMICS365_DYNAMICSCRM_CREATE_ACCOUNT:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_CREATE_CASE:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_CREATE_INVOICE:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_CREATE_OPPORTUNITY:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_CREATE_SALES_ORDER:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_UPDATE_CASE:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_UPDATE_INVOICE:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_UPDATE_OPPORTUNITY:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    • DYNAMICS365_DYNAMICSCRM_UPDATE_SALES_ORDER:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
    Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
  • LowExcessive Permission Surface

    DYNAMICS365_DYNAMICSCRM_CREATE_CONTACT:input schema exposes 11 properties (threshold: 10)

    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.

Scan this tool yourself

Reproduce this audit locally or block risky tools in CI.

Install once, then scan any MCP server:

$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash
$ tooltrust-scanner scan --server "npx -y ms-365-mcp-server"

Adjust the package name if your npm registry name differs from the tool ID. View source

Add badge to your README

Copy this Markdown to show your ToolTrust grade on GitHub.

[![ToolTrust Grade C](https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-directory/main/docs/badges/grade-c.svg)](https://github.com/AgentSafe-AI/tooltrust-directory)