summarize, triage, and draft actions for incoming email. use when the user wants chatgpt to check an inbox, identify important unread messages, group emails...
⭐ 0· 40·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md: the instructions focus on locating mail, filtering messages, triaging, summarizing, and drafting replies. No unrelated binaries, env vars, or installs are requested.
Instruction Scope
Instructions ask the agent to use a connected mail connector when available and to read messages and attachments as needed — this is appropriate for email triage. They also instruct the agent to request exported emails, pasted text, or screenshots if no connector exists. Be aware reading attachments or pasted content may expose sensitive data (which is expected for a triage tool but is a privacy surface to consider).
Install Mechanism
No install spec and no code files are present (instruction-only). Nothing is written to disk or downloaded by the skill itself.
Credentials
The skill declares no environment variables, credentials, or config paths. It references using a mail connector provided by the platform (expected) rather than asking for raw credentials in SKILL.md.
Persistence & Privilege
always is false and the skill does not request persistent/system-level privileges or modify other skills' configs. The agent may invoke the skill autonomously (platform default).
Assessment
This skill appears to do what it says: triage and draft replies for email. Before enabling it, confirm what mailbox connector (Gmail or other) your platform will grant it access to and what scope that connector has (read, send, attachments). Avoid pasting highly sensitive content unless necessary, and verify any draft before sending (the SKILL.md correctly instructs not to send unless the user asks). If you later want to revoke access, remove the mailbox connector/permissions from the platform. If you need tighter controls, request audit logs or limit the connector scope on your provider first.Like a lobster shell, security has layers — review code before you run it.
latestvk979pxk471es1zz0vwdw43e6ch83zrzk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
