gog-restricted

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly coherent and tries to restrict Google Workspace access, but it still enables sensitive Gmail/Calendar reads and account changes, installs a persistent sudo wrapper, and its allowlist is broader than its safety wording implies.

Review this skill before installing. It is not clearly malicious and it tries to block email sending, forwarding, Drive access, and destructive deletes, but it can still read sensitive Google Workspace data, modify Gmail labels, create calendar events, and replace the local `gog` executable with a persistent sudo-installed wrapper. Use it only with a controlled Google account and require explicit approval before any mailbox or calendar change.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could change Gmail labels, archive/trash/mark messages, or create calendar events in the connected Google account if invoked with the wrong parameters.

Why it was flagged

The skill explicitly avoids prompts while allowing mailbox mutations and calendar creation, but it does not require user confirmation or define safe limits for these account-changing actions.

Skill content
Always use `--no-input` to avoid interactive prompts ... `gog gmail batch modify <messageId> ... --add <label> --remove <label>` ... `gog calendar create <calendarId> --summary '...' --from '...' --to '...' --json`
Recommendation

Before installing, require explicit user approval for any Gmail label/batch modification or calendar creation, and review exact message IDs, labels, calendar IDs, and event details before execution.

What this means

The security wrapper may not enforce the documented command boundary as tightly as users expect.

Why it was flagged

The wrapper allows broad two-word command prefixes such as `gmail labels` and `gmail thread`, which is wider than the documented per-command allowlist and may allow additional underlying subcommands if they exist.

Skill content
"gmail thread"|\
    "gmail labels"|\
    "calendar create"|\
Recommendation

Narrow the wrapper to exact allowed subcommands and argument patterns, and avoid broad namespace matches unless every subcommand under that namespace is intentionally allowed.

What this means

The agent can operate against the Google account selected by the local `gog` configuration or `GOG_ACCOUNT` environment variable.

Why it was flagged

The skill uses existing Google Workspace account configuration and can list stored accounts; this is expected for a Google CLI integration but is not declared as a primary credential in the metadata.

Skill content
Default: via GOG_ACCOUNT env ... `gog auth list` — list stored accounts
Recommendation

Confirm which Google account is active before use, and prefer a least-privileged account or profile with only the needed Gmail/Calendar scopes.

What this means

Private messages, attachments, event details, and schedule information may be exposed to the agent during normal use.

Why it was flagged

The allowed commands can retrieve private email and calendar content into the agent context; this is purpose-aligned but sensitive.

Skill content
`gog gmail read <messageId>` ... `gog gmail thread <threadId> --json` ... `gog calendar events [<calendarId>] --json`
Recommendation

Use precise searches and IDs, avoid loading unnecessary messages or attachments, and do not run it on accounts containing data you do not want the agent to see.

What this means

Future `gog` commands will go through this wrapper until the binary is restored.

Why it was flagged

The setup script persistently replaces the existing `gog` executable with a wrapper and stores the real binary as `.gog-real`; this is disclosed but modifies a local executable with sudo.

Skill content
sudo mv "$GOG_BIN" "$GOG_REAL" ... sudo tee -a "$GOG_BIN" ... sudo chmod +x "$GOG_BIN"
Recommendation

Install only if you trust this wrapper, verify the path returned by `command -v gog`, and keep a clear rollback plan to restore the original binary.