Tmp.DFFmMCXLOH

WarnAudited by ClawScan on May 14, 2026.

Overview

This skill is clearly meant for Google Workspace, but it exposes broad authenticated Google account actions through an unpinned external MCP package, including sending mail, deleting or sharing files, and raw “run” tools.

Install only if you trust the gogcli-mcp npm package and are comfortable giving an agent broad access to the selected Google account. Pin and inspect the package where possible, set an explicit Google account, use least-privileged OAuth scopes, and require confirmation before sending email, deleting data, sharing files, or using any run-style tool.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked incorrectly, the agent could send messages, alter or delete Workspace data, or share files from the connected Google account.

Why it was flagged

The skill exposes high-impact mutation and publication actions, including sending email, deleting calendar events, deleting or sharing Drive files, and raw-style run tools, without documented approval or scope limits.

Skill content
| **Gmail** (4) | search, get, send, run | ... | **Calendar** (7) | events, get, create, update, delete, respond, run | ... | **Drive** (9) | ls, search, get, mkdir, rename, move, delete, share, run |
Recommendation

Use only with explicit user confirmation for send, delete, share, update, and run actions; prefer a limited test account or least-privileged Google authorization where possible.

What this means

A connected personal or work Google account could be used broadly across Gmail, Drive, Calendar, Docs, Sheets, Tasks, Contacts, and Auth-related functions.

Why it was flagged

The skill relies on existing authenticated Google account state and allows account selection or override, but the artifact does not bound which account, scopes, or services may be used.

Skill content
- [gogcli](https://github.com/steipete/gogcli) installed and authenticated ... `GOG_ACCOUNT` is optional — omit it to use gogcli's configured default account. ... All tools accept an optional `account` parameter to override the default Google account for that call.
Recommendation

Set an explicit GOG_ACCOUNT, review gogcli’s granted OAuth scopes, remove unused configured accounts, and avoid connecting highly privileged business accounts unless necessary.

What this means

The code that would run locally and access Google account data may differ from what was reviewed, especially if the npm package changes later.

Why it was flagged

The setup runs an external npm package without a pinned version. Because the submitted artifact is instruction-only, the actual MCP server code is not present for review.

Skill content
"command": "npx", "args": ["-y", "gogcli-mcp"]
Recommendation

Pin the npm package version, verify the package source, and inspect the MCP server code before granting it authenticated Google Workspace access.

What this means

Private Google Workspace content may be processed by the agent, and malicious instructions inside emails or documents could influence later agent behavior if treated as instructions.

Why it was flagged

Reading emails, documents, spreadsheets, and Drive files is expected for this integration, but it can place private or untrusted Workspace content into the agent context.

Skill content
provides Claude with access to Google Sheets, Docs, Gmail, Calendar, Drive, Tasks, Contacts, and Auth
Recommendation

Limit retrieval to specific files or messages, treat retrieved content as data rather than instructions, and avoid using this skill on sensitive mail or documents unless needed.