Skip to content

Conversation

@vpcleng
Copy link
Collaborator

@vpcleng vpcleng commented Feb 1, 2026

1.1.4
image

5.1.4.5
image

Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 1c13ec452d

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

Comment on lines +37 to +40
members = await client.get_role_members(role_id)
for member in members:
if member.get("@odata.type") != "#microsoft.graph.user":
continue

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 Badge Include users assigned admin roles via groups

This collector only processes members whose @odata.type is #microsoft.graph.user, so if a directory role is assigned to a group, all users in that group are skipped. In tenants that use group-based role assignments (common for admin roles), the output undercounts admin accounts and therefore misses their license assignments. Consider expanding group membership (e.g., via /transitiveMembers) or resolving group members before building admin_users.

Useful? React with 👍 / 👎.

Copy link
Collaborator

@romil-bijarnia romil-bijarnia left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi,
Thanks for adding these collectors. I believe these controls are not even being shown in the UI at this stage (as they are being skipped). The metadata.json file confirms the policy file is still null for both these controls. Would you please be able to implement this entire feature, which would be adding the relevant rego policies and then false positive/negative testing of the scan results.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants