multiAI Summary Pending

sharepoint-audit

Guide and run a SharePoint audit locally. Collect inputs, confirm PowerShell 7.4+ and Python 3.10+ are available, call PowerShell with certificate auth via wrapper, parse audit.json, and render Markdown/HTML. Use only local shell commands.

231 stars

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/sharepoint-audit/SKILL.md --create-dirs "https://raw.githubusercontent.com/aiskillstore/marketplace/main/skills/aqualia/sharepoint-audit/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/sharepoint-audit/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How sharepoint-audit Compares

Feature / Agentsharepoint-auditStandard Approach
Platform SupportmultiLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Guide and run a SharePoint audit locally. Collect inputs, confirm PowerShell 7.4+ and Python 3.10+ are available, call PowerShell with certificate auth via wrapper, parse audit.json, and render Markdown/HTML. Use only local shell commands.

Which AI agents support this skill?

This skill is compatible with multi.

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# SharePoint Audit Skill

## When to use
- A user needs to audit SharePoint Online permissions for one site or a CSV-defined batch.
- The operator can run PowerShell 7.4+, Python 3.10+, and PnP.PowerShell locally.

## What to do
1. Ask for: Tenant ID, App (Client) ID, PFX path, internal domains, site URL or CSV, and confirm `PFX_PASS` is set.
2. Run:
   - `pwsh ./sharepoint-audit-agent/agent/powershell/Install-Modules.ps1`
   - `python ./sharepoint-audit-agent/agent/python/audit_agent.py … --output ./runs`
3. On success, show `./runs/<timestamp>/site-*/report.html` and remind the user that the file contains sensitive data.

## Rules
- Only run local commands. Do not fetch from the internet beyond module installs.
- Never echo secrets. Read PFX password from env var.
- Default Sites.Selected scope to **Read**; only pass `--sites-selected-permission Write` if the user explicitly authorizes it.