Proton Bridge Email
PassAudited by VirusTotal on May 12, 2026.
Findings (1)
This skill is classified as suspicious due to its handling of sensitive credentials and execution of external commands. The `scripts/send_email.py` script decrypts `PROTON_BRIDGE_PASS` and other sensitive environment variables from `~/clawd/secrets/proton.env.age` using an `age` identity key from `~/.config/age/keys.txt` via `subprocess.check_output(['age', '-d', ...])`. While this is central to the skill's stated purpose of sending emails via Proton Mail Bridge, the direct decryption and use of sensitive credentials, combined with external command execution, represents a high-risk capability. There is no clear evidence of intentional malicious behavior like exfiltration to unauthorized endpoints, but the inherent risk of handling secrets in this manner warrants a 'suspicious' classification.
