Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Mail Mcp

v0.1.0

自动安装并使用 mail-mcp 发送、搜索、管理邮箱邮件和文件夹,支持附件和多种邮件操作。

0· 251·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Name/description map to the provided SKILL.md: it installs mail-mcp from GitHub and provides IMAP/SMTP mail operations. No unexpected capabilities (e.g., cloud administration) are present. Minor note: the skill metadata lacks a homepage and has an unknown owner, reducing traceability.
!
Instruction Scope
SKILL.md instructs the agent/user to create a ~/.mcporter/mcporter.json containing IMAP/SMTP credentials (EMAIL_USER, EMAIL_PASSWORD, IMAP_HOST, SMTP_HOST, etc.). The skill metadata declares no required environment variables, yet the runtime instructions require storing and using sensitive credentials. The instructions do not explicitly exfiltrate data, but they instruct the user to place plaintext credentials in a config file and use pip to install code from a third-party GitHub repo.
Install Mechanism
No formal install spec in registry; the SKILL.md and install.sh perform 'pip install git+https://github.com/AdJIa/mail-mcp-server.git'. Installing from a GitHub repo via pip is common but executes arbitrary code from that repo. The install script uses '--break-system-packages', which can affect system package management on some distros — a moderate risk and a point to prefer virtualenv or user installs.
!
Credentials
Registry lists no required env vars or primary credential, yet the skill expects IMAP/SMTP credentials (including EMAIL_PASSWORD) to be provided in ~/.mcporter/mcporter.json or as env vars. This is a mismatch: sensitive secrets are needed for core functionality but are not documented as required in the skill metadata, and there's no guidance about secure storage or least-privilege credentials (e.g., app passwords).
Persistence & Privilege
always:false and default autonomous invocation are set (normal). The included install.sh does not modify other skills or system-wide agent config beyond running pip and checking a config file; it does not persistently enable itself or other skills. No evidence of elevated platform privileges.
What to consider before installing
This skill appears to do what it claims (install and use a mail MCP tool) but there are two things to weigh before installing: - Sensitive credentials: The runtime instructions require putting your email username/password (or other IMAP/SMTP credentials) into ~/.mcporter/mcporter.json or environment variables. The skill metadata does not declare these required secrets. Only install if you are comfortable storing credentials in that location and understand who will have access. Prefer creating a dedicated account or using App Passwords/least-privilege credentials rather than your primary mailbox password. - Installing code from GitHub: The install uses 'pip install git+https://github.com/AdJIa/mail-mcp-server.git' which will execute code from that repository on your machine. Review the repository source (and its maintainer) before installing. To reduce risk, run the install inside a Python virtual environment or sandbox, and inspect the package contents first. Recommended next steps before proceeding: 1) Inspect the GitHub repo (AdJIa/mail-mcp-server) and confirm its trustworthiness and activity. 2) Use an app-specific password or a dedicated mailbox account for automation. 3) Install in a virtualenv or isolated environment rather than system-wide; avoid '--break-system-packages'. 4) If you need stronger guarantees, ask the author to declare required env vars in metadata and provide documentation about how credentials are used/stored and whether any telemetry or external endpoints are contacted. If you want, I can fetch and summarize the GitHub repository files (setup.py/pyproject, main code) so you can better judge whether the package is safe to install.

Like a lobster shell, security has layers — review code before you run it.

latestvk9733nf0v4bpcma3nshdx9t2e582wzmb

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments