🚨 New research & tool release: OID-See - Giving Your OAuth Apps the Side-Eye
OAuth risk in Entra isn’t a table problem.
It’s a relationship problem.
After spending far too long staring at consent screens, Graph responses, and metadata that technically tells the truth while still being wildly misleading, I ended up building something I couldn’t find anywhere else:
OID-See - essentially BloodHound for OAuth in Entra.
It maps:
• OAuth apps & service principals
• Delegated scopes and app permissions
• Consent, assignments, and reachability
• Trust signals (and trust illusions)
• Persistence and impersonation paths
…into a graph-backed analysis model that lets you reason about what an app can actually become when chained, not just whether it looks risky in isolation.
Why this exists
I kept running into the same issues:
• “Verified publisher” isn’t always the signal we think it is
• Microsoft-shaped metadata can lull defenders into false trust
• offline_access ≠ impersonation, but does equal persistence
• Apps without assignment requirements are exposed by default
• Spreadsheets hide abuse paths - graphs expose them
So I stopped trying to answer “is this app bad?”
and started asking “what does this enable if it’s abused?”
What OID-See is (and isn’t)
✅ Graph-only by default (no token scraping, no SaaS, no data exfil)
✅ You run it yourself, get a JSON, analyse it locally
✅ Explainable scoring, externalised logic, no magic
❌ Not a CSPM replacement
❌ Not an EDR, SWG, or token replay tool
It’s about clarity, not control theatre.
📖 Blog (deep dive, philosophy, and war stories):
👉 https://cirriustech.co.uk/blog/oidsee/
🧰 Tool & source (v1.0.0):
👉 https://github.com/OID-See/OID-See/tree/v1.0.0
If you’re an Entra admin, cloud security engineer, or anyone who’s ever said
“it’s just a harmless SSO integration” - this one’s for you.
And yes… the name is intentional.
You probably should be giving your OAuth apps the side-eye. 👀
#Entra #AzureAD #OAuth #OIDC #IdentitySecurity #SecurityResearch #AttackSurface #Graph #BloodHound #OIDSee