Skip to main content

Power Platform Security Assessment Tool

Project description

Power Platform Quick Assessment Tool

Open Source Risk Assessment Tool for Power Platform

With citizen developers' widespread adoption of Microsoft Power Platform, security teams are challenged to evaluate the risks and vulnerabilities created by these business users.

To assess your risk exposure, Nokod developed "Power Platform Quick Assessment Tool", a lightweight, open-source assessment tool that you can easily run locally/on-premise.
Its purpose is to provide a quick and informative view of your Power Platform environments - development and production - and help you understand the size of your attack surface and prominent security issues.
Receive an easily shareable report with stats on your environments, components, and connectors and insights into vulnerabilities.

If you need help with this tool, please contact us at support@nokodsecurity.com.

Requirements

The following Power Platform privileges are required for the tool to run:

  • Power Platform administrator (or a global administrator).
  • Explicit "system administrator" privileges for each of the environments that are scanned.

Installation

You can install the package using pipx (recommended), pip, or uv.

Using pipx (recommended)

pipx installs the package in an isolated environment and makes it available globally (works on all platforms).

First, install pipx following the official installation guide.

Then install the tool:

pipx install power-platform-security-assessment

Using uv

# Create virtual environment
uv venv

# Install the package
uv pip install power-platform-security-assessment

Using pip

# Create virtual environment
python -m venv venv

# Activate virtual environment
source venv/bin/activate   # macOS/Linux
venv\Scripts\activate      # Windows

# Install the package
pip install power-platform-security-assessment

Usage

If installed with pipx

Run the security assessment tool directly:

power-platform-security-assessment

If installed with pip or uv

First activate your virtual environment, then run the tool:

# If installed with uv
source .venv/bin/activate   # macOS/Linux
.venv\Scripts\activate      # Windows

# If installed with pip
source venv/bin/activate    # macOS/Linux
venv\Scripts\activate       # Windows

# Run the tool
power-platform-security-assessment

Available Arguments

  • --debug: Enables debug mode with additional logging.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

power_platform_security_assessment-0.1.6.tar.gz (24.6 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

File details

Details for the file power_platform_security_assessment-0.1.6.tar.gz.

File metadata

File hashes

Hashes for power_platform_security_assessment-0.1.6.tar.gz
Algorithm Hash digest
SHA256 17decaa7f9fb0f166ba92971e27d7397347dc39044cf5f8fb7b081a217b5bbdf
MD5 8056fbc8c186b6b820db9b802906a397
BLAKE2b-256 2982bc89689104a8b0983c54488e48a49c694c9915b34eb8123feb915200c186

See more details on using hashes here.

File details

Details for the file power_platform_security_assessment-0.1.6-py3-none-any.whl.

File metadata

File hashes

Hashes for power_platform_security_assessment-0.1.6-py3-none-any.whl
Algorithm Hash digest
SHA256 508a64d58bd2570da49d33b1230ebac851160cb3460e3ae2b5c3496474e7985e
MD5 88720485b9a43dbe388797903797b5c0
BLAKE2b-256 c6cd8498d7cfccffc3b0e7e0279864b571dfdcfd208550aaa4613b237ba03122

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page