WeCom邮箱

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is aligned with sending work email, but it relies on undeclared persistent mailbox credential files, including personal or delegated accounts, so it needs review before use.

Use this skill only with a dedicated work mailbox and after verifying how credentials are stored. Do not keep real mailbox passwords in Base64, avoid personal or delegated accounts unless explicitly approved, and confirm recipients and message content before every send.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used incorrectly, the agent could send an unintended email to real recipients.

Why it was flagged

The skill documents raw SMTP login and message sending. This is expected for an email-sending skill, but outbound email is an externally visible action that should remain user-confirmed.

Skill content
server.login(SMTP_USER, SMTP_PASSWORD)
server.sendmail(SMTP_USER, ["recipient@example.com"], msg.as_string())
Recommendation

Require explicit confirmation of sender, recipients, subject, body, and any source files before every send.

What this means

An agent with access to these files could potentially send mail as a business, delegated, or personal account.

Why it was flagged

The skill points the agent at local mailbox credential files, including delegated and personal email credentials. This high-impact account access is broader than a single clearly declared dedicated mailbox credential.

Skill content
凭证文件 | ~/.openclaw/workspace/memory/sc-email-credentials.enc ... SC代发邮箱: 需用户明确授权 ... 个人邮箱: ~/.openclaw/workspace/memory/email-credentials.enc
Recommendation

Use a dedicated least-privileged SMTP account, declare required credentials in metadata, avoid personal mailbox credentials, and require per-message authorization.

What this means

Mailbox passwords or recipient data could be exposed, reused across tasks, or modified in persistent memory.

Why it was flagged

Credentials are stored in a persistent workspace memory location, and the documented storage may be reversible Base64 rather than real encryption. The skill also gives a decode command, increasing exposure risk.

Skill content
凭证位置: ~/.openclaw/workspace/memory/sc-email-credentials.enc
- 编码方式: Base64 或 AES 加密
- 解码命令示例: `base64 -d ~/.openclaw/workspace/memory/sc-email-credentials.enc`
Recommendation

Store secrets in a proper secret manager or protected environment variable, do not use Base64 as credential protection, avoid printing decoded credentials, and document retention and access controls.

What this means

If a user or agent later obtains a script with this name from elsewhere, that script would need separate review before use.

Why it was flagged

The skill references a helper script, but the provided artifact set contains only SKILL.md. The helper script's behavior and provenance were not available for review.

Skill content
python3 scripts/send-email.py --to "xxx@example.com" --subject "主题" --body "内容"
Recommendation

Include any helper script in the reviewed package or remove the example; do not run an unreviewed email-sending script.