Daily Briefing

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: daily-briefing Version: 1.0.5 The skill is classified as suspicious due to two significant vulnerabilities found in `scripts/daily_briefing_orchestrator.sh`. Firstly, the `emails.icloudPassword` is read from the user's configuration and written in cleartext into the `/tmp/daily_briefing_data.json` file, exposing a sensitive credential on disk. Secondly, the `REMINDERS_DUE_FILTER` configuration value is used directly in a `remindctl` command without proper sanitization, creating a shell injection vulnerability if an attacker can modify the `~/.openclaw/openclaw.json` configuration file. While the skill's stated purpose is benign, these flaws present exploitable risks for sensitive data exposure and arbitrary command execution.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Calendar items, reminders, birthdays, and email previews may remain in a local temp file after the briefing is generated, where retention and access controls are not clearly bounded.

Why it was flagged

The data gatherer uses a predictable /tmp JSON path for the consolidated briefing data and only shows cleanup when explicitly called with --cleanup.

Skill content
OUT="/tmp/daily_briefing_data.${RUN_ID}.json"
CANON="/tmp/daily_briefing_data.json"
...
rm -f /tmp/daily_briefing_data.*.json /tmp/daily_briefing_data.json
Recommendation

Store gathered data under a private skill directory with restrictive permissions, delete it automatically after use, or clearly document retention and cleanup expectations.

What this means

A user may enable email analysis believing email content cannot leave the device, even though that depends on the agent/model configuration outside this skill.

Why it was flagged

The skill explicitly places email data into the agent/model context, but the artifacts cannot guarantee that every user's agent model runs locally or avoids external model providers.

Skill content
Privacy note: Email analysis happens locally using the agent's model context. No email data is sent to external services beyond what you've configured.
Recommendation

Clarify that email privacy depends on the user's configured model/provider, and require explicit opt-in before sending email subjects or previews into model context.

What this means

Installing and enabling all integrations can give the runner access to contacts, calendars, reminders, Gmail, and iCloud Mail data.

Why it was flagged

The skill asks for broad local app permissions and optional mail account access, which are expected for the stated features but high-impact.

Skill content
Grant Terminal.app ... Contacts ... Calendars ... Reminders ... For iCloud Mail: Generate an app-specific password ... For Gmail: Ensure `gog` is authenticated
Recommendation

Enable only the integrations you need, use app-specific credentials, and review macOS privacy permissions before granting access.

What this means

A malicious email or calendar invite could contain text that tries to influence the agent's instructions, even though the skill's intended output is only a briefing.

Why it was flagged

Calendar titles, email subjects, and email previews can come from external parties and are fed into the agent context for summarization.

Skill content
"calendar": { "data": [ {"title": "Team standup" ... } ] } ... "emails": { "data": [ {"subject": "Your order has shipped", "preview": "Your package is on its way..."} ] }
Recommendation

Treat all email and calendar text as untrusted data, and add explicit instructions not to follow commands found inside gathered content.

What this means

Those tools may access sensitive accounts and local data, so their provenance and permissions matter.

Why it was flagged

The documented enhanced setup depends on optional third-party CLI tools installed outside the skill package.

Skill content
brew install steipete/tap/gogcli ... brew install ajrosen/tap/icalpal ... brew install steipete/tap/remindctl ... brew install himalaya
Recommendation

Install optional tools only from trusted sources and keep them updated; verify which accounts each tool can access.