OID-See v1.0.1 is out đ
This is a precision release.
No shiny new dashboards.
No dramatic architectural upheaval.
Just tighter logic, fewer false positives, and a scoring model that better reflects how Entra actually behaves in the real world.
If youâre already using OID-See, this release should feel immediately calmer - and more trustworthy.
đ Release: https://github.com/OID-See/OID-See/releases/tag/v1.0.1
Why this release exists
As more people started using OID-See against real tenants (including very large and very messy ones), a few things became clear:
- Some signals were technically âtrueâ but operationally misleading
- Some risk factors needed context gating, not raw scoring
- A couple of heuristics were doing too much too early
v1.0.1 is about fixing that.
This release is the result of:
- Dogfooding against production Entra tenants
- Feedback from identity architects and defenders
- Me getting annoyed at my own tool for shouting when it shouldnât đ
Whatâs changed in v1.0.1
đ§ App role assignment risk â fixed
Previously, apps with appRoleAssignmentRequired = false could still pick up elevated risk purely due to assignment counts.
Thatâs backwards.
In v1.0.1:
- Assignment count alone no longer materially increases risk
- Exposure is correctly driven by âassignment not requiredâ
- Privileged roles and scopes are now the deciding factor
This dramatically reduces noise for:
- Microsoft firstâparty apps
- Broadly accessible SaaS integrations
- Legitimate enterprise tooling
đ¤ Ownership: governance vs security
Apps with no owners were previously treated as a security risk. Per Glenn Van Rymenant’s analysis, this increases risk rather than indicating security hygiene. Apps with no owners have reduced mutation attack surface; apps with user owners have highest risk.
In reality:
- This is often a governance gap
- Especially common with thirdâparty and gallery apps
Now:
- âNo ownersâ is flagged as a governance issue
- It no longer inflates core security risk scoring
- Still visible, still actionable - just correctly classified
đ Deception logic â gated and smarter
The deception heuristic has been tightened significantly.
Previously, publisher/app name mismatches could trigger deception signals even when:
- The app was unverified
- The publisher surface wasnât trustworthy to begin with
In v1.0.1:
- Deception checks are gated behind
verifiedPublisherId - Additional logic handles identityâlaundering patterns, such as:
- Microsoftâlooking publisher names
- MSAâstyle tenants
- NonâMicrosoft reply URLs and domains
Result: fewer false alarms, stronger signals when it really matters.
What didnât change (on purpose)
- The data model
- The JSON schema
- The graph visualisation approach
- The âexplainable riskâ philosophy
This release is intentionally conservative.
No breaking changes. No schema churn.
Whatâs next
v1.0.1 clears the ground for bigger things:
- Better signal composition
- More defensible scoring explanations
- Cleaner separation between security risk, governance risk, and design tradeâoffs
- Deeper firstâparty vs thirdâparty differentiation
If youâre using OID-See to support:
- Identity risk assessments
- App governance conversations
- Conditional Access strategy
- âWhy is this risky?â discussions with stakeholders
This release should make those conversations easier.
Feedback welcome (seriously)
OID-See is shaped by realâworld usage.
If you spot:
- Scoring that feels off
- Signals that lack context
- Things that make you mutter âyeah butâŚâ
Open an issue, start a discussion, or shout at me on LinkedIn / Slack / Mastodon.
Because tools should get better the more theyâre used - not louder.