Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Email Smart Reply (AI-Powered)
v1.0.0AI-powered email reply generation for B2B sales. Analyzes incoming emails to detect intent (inquiry, delivery chase, complaint, technical question, partnersh...
⭐ 0· 44·1 current·1 all-time
byJaden's built a claw@cjboy007
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Functionality (IMAP fetch → intent classification → KB retrieval → reply generation → Discord review → SMTP send) is coherent with an 'Email Smart Reply' skill. The code references exactly the expected pieces (IMAP, OpenRouter LLM, LanceDB/Obsidian KB, Discord bot, SMTP). However the registry metadata declares no required environment variables or credentials while the code clearly requires multiple secrets and access to other workspace skills and filesystem paths—this is an important mismatch.
Instruction Scope
SKILL.md & scripts instruct the agent to read workspace-level .env files, access $WORKSPACE/skills/imap-smtp-email/, scan an Obsidian vault, call external APIs (OpenRouter), push messages to Discord, and invoke external scripts (python search script under vector_store). The code also performs file writes (drafts, reviews-pending) and executes child processes (execSync/execFile). These actions go beyond a simple classifier/generator and require access to email credentials, bot tokens, and local KB — the instructions lack an explicit declaration of these runtime dependencies and the skill will access cross-skill directories which may contain sensitive data.
Install Mechanism
No install spec (instruction-only with included JS files). That lowers installation risk because nothing is automatically downloaded. However included code invokes other local scripts (Python search script) and expects other workspace components; those external scripts will be executed at runtime (execSync/execFile), so risk comes from runtime execution rather than an installer.
Credentials
The skill's manifest lists no required env vars, but the code expects and reads multiple sensitive environment variables and paths: OPENROUTER_API_KEY (OpenRouter LLM), DISCORD_BOT_TOKEN, IMAP_USER/IMAP_PASS/IMAP_HOST/IMAP_PORT/IMAP_TLS, VECTOR_STORE_PATH or PYTHON_PATH, KB_PATH, DRAFTS_DIR and a root .env. It also expects access to another skill's directory ($WORKSPACE/skills/imap-smtp-email) and vector_store scripts. Requesting these secrets would be proportionate for the stated functionality, but the metadata omission is an incoherence and increases risk because the installer/registry entry does not warn the user; cross-skill filesystem access (reading/writing drafts in another skill) is particularly noteworthy.
Persistence & Privilege
The skill is not marked 'always: true' and does not request elevated agent-wide privileges. It does create and modify files within its own and other workspace directories (drafts, reviews-pending) and sets timeouts for in-process timers. It also calls out to other skill directories ($WORKSPACE/skills/imap-smtp-email/) and thus may modify or create drafts that another skill expects to own — this cross-skill file modification is a privilege/footprint the user should be aware of.
What to consider before installing
What to check before installing or running this skill:
1) Credentials and metadata mismatch: The registry lists no required environment variables, but the code clearly needs IMAP/SMTP credentials, OPENROUTER_API_KEY, and a Discord bot token. Do not provide these secrets until you inspect and trust the code. Update the registry metadata to list required env vars before running in production.
2) Run in dry-run / isolated environment first: Use the provided --dry-run mode and run the integration test in a sandbox or throwaway VM to verify behavior. Dry-run prints embeds instead of sending but still reads .env and local files — run on a machine that does not contain production secrets.
3) Inspect and harden .env and workspace paths: The scripts read a root .env and expect access to $WORKSPACE/skills/imap-smtp-email/ and a vector_store directory. Ensure those paths do not contain unrelated credentials or secrets you don't want this skill to access. Consider running the skill in a dedicated workspace with only the minimal KB and test mailboxes.
4) Child-process and external script execution: kb-retrieval uses execSync to call a python script in vector_store; discord-review uses execFile to invoke an SMTP node script. Confirm the existence and contents of those external scripts (they will execute with your environment and could run arbitrary code). If you cannot verify them, do not run the live pipeline.
5) Missing referenced files: The code attempts to call a scripts/smtp.js (via execFile) and references $WORKSPACE/skills/imap-smtp-email/drafts/ and vector_store/search-customers.py; verify those files exist and are safe. If files are missing it may crash or fall back to other behaviors.
6) Limit service permissions: If you run it, give the process least privilege: a dedicated mailbox account with minimal permissions, a Discord bot with access only to the review channel, and an OpenRouter key with appropriate billing/usage controls. Avoid using admin accounts or shared credentials.
7) Code review checklist: confirm that OpenRouter API key is used only for classification/reply generation, that the skill does not exfiltrate data to unknown endpoints, and that Discord messages are posted only to the configured channel. Check calls to fetch() and child_process usages for unexpected endpoints or command injection vectors.
8) Operational suggestions: Pin dependencies, run static code analysis, and consider wrapping the skill in a supervised service that enforces timeouts and logs network calls. Only enable automatic or cron-driven runs after a successful dry-run audit and after limiting the credentials to a test account.scripts/discord-review.js:197
Shell command execution detected (child_process).
scripts/kb-retrieval.js:29
Shell command execution detected (child_process).
scripts/integration-test.js:57
Environment variable access combined with network send.
scripts/intent-recognition.js:117
Environment variable access combined with network send.
scripts/reply-generation.js:24
Environment variable access combined with network send.
scripts/integration-test.js:255
File read combined with network send (possible exfiltration).
scripts/intent-recognition.js:20
File read combined with network send (possible exfiltration).
scripts/reply-generation.js:145
File read combined with network send (possible exfiltration).
Patterns worth reviewing
These patterns may indicate risky behavior. Check the VirusTotal and OpenClaw results above for context-aware analysis before installing.Like a lobster shell, security has layers — review code before you run it.
latestvk972vtzcwqn2sbwjzrd50xfk3583q75n
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
