Extracts structured data from emails
v1.0.0Extract structured data from email text, identifying company domain, contact, discount codes, and classifying email type as order, offer, newsletter, or other.
⭐ 0· 322·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
The name/description match the SKILL.md instructions: extract structured fields from email text. The skill requests no binaries, credentials, or config paths that would be unrelated to parsing emails.
Instruction Scope
Instructions are narrow (take email text, return the specified JSON). However, some extraction rules are under-specified (e.g., how to choose contact_person when multiple names exist, handling multiple discount codes, or ambiguous 'company = domain between @ and first dot'). These are functional/accuracy issues rather than security concerns, but they could cause incorrect or overly broad extraction of personal data.
Install Mechanism
No install spec or code files — instruction-only — so nothing is written to disk or downloaded at install time.
Credentials
The skill declares no environment variables, credentials, or config paths. There is nothing requesting unrelated secrets or access.
Persistence & Privilege
always is false and autonomous invocation is the platform default; nothing else in the skill requests permanent presence or elevated privileges.
Assessment
This skill is internally consistent and low-risk from an installation/privilege perspective because it is instruction-only and asks for no credentials. Before using it on real data, test with sanitized example emails to verify the parser's behavior (company extraction rule, handling of multiple contacts or codes). Avoid submitting highly sensitive or regulated email contents (passwords, financial account numbers, personal health information) to any third-party skill unless you control where outputs/logs are stored. If you need stronger guarantees, request a version that documents exact parsing rules, edge-case behavior, and data retention (or run the parsing locally in controlled software).Like a lobster shell, security has layers — review code before you run it.
latestvk9705cdnv0daz30rhkgt1d2a9d81ypqz
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
