Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Automatically logs into email accounts (Gmail, Outlook, QQ Mail, etc.) and generates daily email summaries. Use when the user wants to get a summary of their emails, check important messages, or create daily email digests.
v0.1.0Automatically logs into email accounts (Gmail, Outlook, QQ Mail, etc.) and generates daily email summaries. Use when the user wants to get a summary of their emails, check important messages, or create daily email digests.
⭐ 10· 13.9k·131 current·138 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The skill's name/description (daily email summaries) matches what the SKILL.md instructs: open webmail, extract messages, take screenshots, and produce summaries. Using browser automation to scrape inboxes is a coherent approach for this purpose.
Instruction Scope
The instructions tell the agent/operator to reuse logged-in browser sessions or perform manual logins (including entering passwords via automation). They instruct scraping full email content and taking screenshots — highly sensitive operations. The SKILL.md also references an environment variable (BROWSER_USE_API_KEY) and uses commands that can capture and persist email data, but these env vars/credentials are not declared in the skill metadata. The skill grants broad discretion (e.g., JS eval, Python snippets) to extract arbitrary page content which could exfiltrate anything visible in the browser session.
Install Mechanism
There is no formal install spec in the registry, but the SKILL.md instructs installing a third‑party package ('browser-use') via pip. Installing arbitrary PyPI packages is a material risk if you don't trust the package author. The install command contains a likely typo ('uv pip install'), which is suspicious or at least unclear and would mislead users. Because no source/homepage is provided, provenance of the required tooling is unknown.
Credentials
The skill metadata declares no required env vars or credentials, but the instructions mention BROWSER_USE_API_KEY and advise (implicitly) reusing browser sessions or entering email passwords. Requesting or using email account credentials is highly sensitive and is not justified in the metadata. The skill does not explain what remote services (if any) the browser-use CLI contacts or whether extracted email content is transmitted off‑device.
Persistence & Privilege
The skill itself is not always-enabled and does not request elevated platform privileges. However the instructions include setting up cron/launchd jobs to run the scraping regularly and writing screenshots/reports to disk. Scheduling repeated automated access to an email account increases the impact if the tooling or configuration is insecure or malicious.
What to consider before installing
Before installing or running this skill, consider the following:
- This skill requires a third‑party CLI (browser-use) that the SKILL.md asks you to pip install, but the package source and maintainer are not provided — verify the package on PyPI/GitHub and inspect its code before installing.
- The runtime instructions reuse logged‑in browser sessions or automate entering passwords. Never store plain passwords in scripts; prefer official OAuth flows or app‑specific credentials with least privilege.
- The skill references BROWSER_USE_API_KEY and other runtime secrets but the registry metadata doesn't declare them. Treat any tool that can access your browser session or run JS on webmail pages as capable of reading and exfiltrating sensitive data.
- The install command contains a typo ('uv pip install'), which may break flows or be an attempt to obfuscate — confirm the correct install steps from an authoritative source.
- If you decide to proceed: run the tooling in a controlled environment (VM/container), audit the browser-use package source, avoid entering primary account passwords (use app passwords or OAuth where possible), and restrict network access to limit potential data exfiltration.
If you cannot verify the provenance of 'browser-use' and how it handles extracted data, do not run this skill against primary/important email accounts.Like a lobster shell, security has layers — review code before you run it.
latestvk971skmqmsbq7dp4psvankevbs80k24z
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
