google-workspace-rave
Analysis
This skill is not plainly malicious, but it asks an agent to handle Google OAuth credentials and grants broad Google Workspace read/write/admin authority that users should review carefully.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"It gives your AI agent full access to Google Workspace" and "Everything the Google Workspace APIs support" including "Gmail | Read, send, search, label, filter emails" and "Admin | User management, directory queries"
The skill intentionally exposes broad raw Workspace API authority, including sensitive read/write/admin operations, but the artifacts do not define mandatory confirmation, scope limits, or rollback expectations for high-impact mutations.
Registry: slug "google-workspace-rave", version "1.0.2", owner "kn7fya..."; _meta.json: "slug": "gws-workspace", "version": "1.1.0", "ownerId": "kn79as..."
The registry identity and packaged metadata do not match. For a skill that handles Google Workspace credentials and installs an external CLI, inconsistent provenance is material.
"# Delete all files in trash" followed by `gws drive files list ... --page-all | ... | xargs -I{} gws drive files delete`The documented batch pattern can apply a Workspace action to every matched item. It is presented as an advanced example, not hidden behavior, but it can amplify a bad query or mistaken instruction.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
SKILL.md: "Prompt the user to provide their Google Cloud OAuth `client_secret.json`... upload the file or paste its contents into the chat... save it as `credentials.json`"; metadata: "Primary credential: none"
The skill directs the agent to collect and store OAuth credential material even though the registry does not declare a primary credential. This grants Google account or Workspace authority and is not clearly bounded by metadata.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`gws mcp` ... "exposes all Workspace operations as MCP tools for compatible AI agents and IDEs."
The MCP server is an optional documented feature, but if run, it can expose the same broad Workspace authority to other agent or IDE clients.
