Insecure tls verification
- Finding
- HTTPS certificate verification is disabled.
Security checks across static analysis, malware telemetry, and agentic risk
This email skill mostly matches its purpose, but it disables IMAP TLS certificate verification while handling mailbox credentials and makes a local credential-file safety claim that is not backed by the provided artifacts.
Only install this if you are comfortable granting the agent access to read and send email from the configured mailbox. Use an app-specific password, manually restrict the config file permissions, confirm every outgoing email and attachment, and avoid using the skill until the IMAP TLS certificate verification issue is fixed.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A network attacker or spoofed mail server could potentially intercept mailbox credentials or email contents.
The IMAP client disables TLS certificate verification while authenticating to the mail server and fetching mailbox data.
tlsOptions: { rejectUnauthorized: false }Do not use the skill until certificate verification is enabled by default; only allow an explicit, documented opt-out for trusted test environments.
Installing and configuring this skill gives the agent authority to read your mailbox and send email as you.
The skill uses the configured mailbox credentials to send email through SMTP and also uses the same credential data for IMAP mailbox access.
auth: { user: config.email, pass: config.password }Use an app-specific authorization code, limit the account’s privileges where possible, and confirm all send actions before execution.
Users may believe their stored email authorization code is protected when the reviewed artifacts do not demonstrate that protection.
The documentation states that the config file permissions are already user-only, but the provided artifacts do not show code or an install step that creates the file or sets those permissions.
- 配置文件权限已设置为仅用户可读
Document the actual storage behavior and explicitly instruct users to set restrictive permissions, or implement secure file creation and permission checks.
A malicious email could contain instructions that try to mislead the agent or user into unsafe actions.
The read-email path returns external email body content to the agent, including text and HTML fields.
text: parsed.text || '', html: parsed.html || ''
Treat email contents as untrusted data and do not let instructions inside emails override the user’s actual request.