1. Unauthorized flow creation for data transfer
An attacker modifies an existing Power Automate workflow to send data to an external service, disguising it as part of normal business operations.
2. Internal user testing security limits
A user without sufficient authorization creates complex flows that trigger security mechanisms, prompting an investigation.