quiet-mail

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: quietmail Version: 1.0.0 The skill bundle is classified as suspicious due to the presence of hardcoded credentials in test files. Specifically, `test_send_email_direct.py` and `test_testbot_smtp.py` contain hardcoded email addresses and their corresponding plaintext passwords for test accounts (`bob@quiet-mail.com`, `test-bot@quiet-mail.com`). Additionally, `tests/phase2_test.py` contains hardcoded PostgreSQL database credentials (`quietmail:quietmail`) and logic to retrieve API keys directly from the database. While these are test files and not part of the core skill execution for an AI agent, their inclusion in the bundle represents a significant security vulnerability if the service were deployed using these files, potentially exposing sensitive internal credentials. The `SKILL.md` and `API.md` files do not contain any evidence of prompt injection or malicious instructions to the AI agent.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone who obtains the skill package may be able to authenticate as that mailbox and send mail under that identity if the credential is still valid.

Why it was flagged

A packaged test script contains a specific SMTP username and password for an existing mailbox rather than using an environment variable or mock secret.

Skill content
username="bob@quiet-mail.com", password="TG4IqhvLyXXO..."
Recommendation

Remove the credential from the package, rotate the mailbox password immediately, and require all tests to read secrets from local environment variables or a secret manager.

What this means

This exposes mailbox-level authority beyond what a normal user should receive from an email-sending skill.

Why it was flagged

A second packaged test script includes another concrete SMTP account password for quiet-mail infrastructure.

Skill content
username="test-bot@quiet-mail.com", password="LxTWbNgAHxY9..."
Recommendation

Remove and rotate this credential as well, and add secret scanning to prevent live credentials from being published.

What this means

An autonomous agent could send unwanted, mistaken, or abusive email at scale, creating recipient harm and reputational or policy risk for the user and service.

Why it was flagged

The documented workflow lets an agent create an email identity without prior authentication and use it for broadly unlimited outbound email.

Skill content
"Simple, unlimited email for AI agents. No verification required"; "Create Agent" / "No authentication required"; "No daily sending limit"
Recommendation

Require explicit user approval before each send or campaign, document acceptable-use limits, implement enforceable rate limits, and scope allowed recipients/use cases.

What this means

Inbox messages may contain secrets, verification links, or malicious instructions that an AI agent could over-trust if treated as authoritative context.

Why it was flagged

The backend can retrieve full mailbox contents and return email bodies to the agent.

Skill content
await imap.login(current_agent.email, current_agent.mailbox_password) ... bodyText=body_text, bodyHtml=body_html if body_html else None
Recommendation

Protect the quiet-mail API key like full mailbox access, avoid exposing sensitive inboxes, and instruct agents to treat email content as untrusted data rather than commands.

What this means

Users have less registry-level provenance information for deciding whether to trust the external email service.

Why it was flagged

The registry metadata does not provide a source or homepage even though the skill directs agents to a hosted external email API.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Verify the service operator and domain independently before using it, and prefer a registry entry with a declared source and homepage.