Bee Push Email
Analysis
This appears to be a real email-notification skill, but it installs a persistent system service and handles powerful email, Telegram, and OpenClaw credentials in ways users should review carefully.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
url = f'https://github.com/pimalaya/himalaya/releases/latest/download/himalaya-{arch_suffix}.tar.gz'; run(f'curl -sSfL {url} | tar -xz -C /usr/local/bin/ himalaya', check=False)The installer downloads the latest Himalaya release and extracts it into a system binary path without a pinned version or checksum.
Your OpenClaw agent reads, analyzes, and decides what to do: notify you, move spam, flag important emails, or stay silent.
The documented behavior includes autonomous email-account changes, not only passive notification.
This skill installs a persistent background service (`Restart=always`, starts on boot). It maintains a continuous IMAP connection.
The persistent service is clearly disclosed and purpose-aligned, but users should notice that it continues running after installation.
Primary credential: none; Required config paths: none; No install spec — this is an instruction-only skill.
The registry-level metadata under-declares the actual credential use and full-system installation shown in SKILL.md and the scripts. The body documentation is more transparent, so this is a disclosure note rather than a standalone malicious signal.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
if 'openclaw_token' not in config: token, source = read_openclaw_gateway_token(); config['openclaw_token'] = token ... json.dump(config, f, indent=2); os.chmod(CONFIG_PATH, 0o600)
The installer reads a local OpenClaw gateway token and persists it into the watcher config. That is powerful delegated agent access, not just an email password.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
# Fallback: any UUID found ... log.info(f"Using fallback session: {match.group(1)}"); return _cache_and_return({'session_id': match.group(1)})If the preferred direct session is not found, the watcher falls back to any session UUID it sees before delivering notifications.
