Email 163 Com Backup
PassAudited by VirusTotal on May 15, 2026.
Findings (1)
The bundle provides a 163.com email management tool but is classified as suspicious due to the inclusion of specific, functional-looking credentials (email and authorization code 'KZtfcUWCKGNFf9M9') within documentation files like SKILL.md, INSTALL.md, and TEST-REPORT.md. Furthermore, the install.sh script utilizes a risky 'curl | bash' pattern to fetch a remote payload from a placeholder URL. While the main.py script correctly implements the IMAP ID extension (RFC 2971) and lacks obvious exfiltration logic, the presence of hardcoded secrets and the remote-execution installer pose significant security risks.
