Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

gmail-checker

v1.0.0

Send, read, search, and manage Gmail emails via the Gmail REST API. Use when asked to send an email, check inbox, read messages, search mail, reply to emails...

0· 77·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name and description match the actions shown in SKILL.md (send/read/search/manage Gmail). Required binaries (curl, jq) and GMAIL_ACCESS_TOKEN are appropriate for calling the Gmail REST API. However, the README also documents an OAuth refresh flow that needs GMAIL_CLIENT_ID, GMAIL_CLIENT_SECRET, and GMAIL_REFRESH_TOKEN — these are not listed in the skill's declared required env vars, which is an inconsistency.
!
Instruction Scope
SKILL.md instructs the agent to: (a) use an OAuth refresh flow and set GMAIL_ACCESS_TOKEN from curl output (references GMAIL_CLIENT_ID, GMAIL_CLIENT_SECRET, GMAIL_REFRESH_TOKEN), (b) read local file paths for attachments (user-supplied file paths), and (c) perform 'web_research' by calling web_search and fetching arbitrary web pages (xurl/curl). These runtime steps access environment variables and local files beyond the single declared env var and include fetching external URLs — behavior that increases opportunity for unintended data access or exfiltration and is not fully declared.
Install Mechanism
Instruction-only skill with no install spec and no code files. This minimizes disk-written third-party code; risk comes from the runtime instructions rather than an installed binary.
!
Credentials
Declared required env vars list only GMAIL_ACCESS_TOKEN, which is appropriate. But the documented refresh-token option requires additional sensitive values (GMAIL_CLIENT_ID, GMAIL_CLIENT_SECRET, GMAIL_REFRESH_TOKEN) that the skill uses at runtime but does not declare as required. Those are high-value secrets and should be explicitly declared and justified. The skill also suggests reading attachment file paths (local filesystem access) without detailing safeguards.
Persistence & Privilege
always is false and the skill does not request persistent system configuration or write to other skills' settings. Autonomous invocation is allowed (default) but not combined with elevated privileges in this package.
What to consider before installing
This skill generally does what it says — call the Gmail API via curl — but there are notable inconsistencies and risks you should consider before installing: - Secrets disclosure: The SKILL.md describes a refresh-token flow that uses GMAIL_CLIENT_ID, GMAIL_CLIENT_SECRET, and GMAIL_REFRESH_TOKEN, but those variables are not declared in the skill metadata. If you set them, they are high-value credentials; only provide them if you fully trust the skill and the environment. Prefer creating OAuth credentials with the minimum required scopes and a test account if possible. - Local file access: The skill accepts 'attachments' as file paths. Confirm how attachments are read/encoded and avoid pointing it at directories containing sensitive files. Treat the agent's runtime environment like any process that can read files. - External fetches: The skill's 'web_research' flow instructs fetching arbitrary web pages (xurl/curl). That can leak data (for example, if it fetches pages that include private links) or contact third parties. If you don't want network fetches, request a version of the skill that disables web research. - Lack of declared env vars: Ask the publisher to update the skill metadata to list all environment variables the runtime uses (including client id/secret/refresh token) so you can make an informed decision. - Mitigations: If you proceed, run it with a dedicated Gmail account and OAuth credentials with the narrowest scopes needed; avoid placing permanent creds in global shell profiles; monitor and be prepared to revoke tokens via Google Cloud Console. If you want, I can draft questions to send to the skill author asking them to (1) declare all env vars used, (2) show how attachments are handled, and (3) provide an option to disable web fetching.

Like a lobster shell, security has layers — review code before you run it.

latestvk97b9qsqj6e8dhd8jt5zjegkx58399ne

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

📧 Clawdis
Binscurl, jq
EnvGMAIL_ACCESS_TOKEN

Comments