Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

nmail

v0.2.0

Command-line tool to send, read, and manage Korean Naver and Daum emails via nmail with JSON outputs and account configuration.

0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The name/description match the code: a CLI for Naver/Daum IMAP/SMTP. However the package metadata claims 'instruction-only' with no required binaries, while SKILL.md requires the nmail binary in PATH and the repository includes full source code. README suggests brew/go installs yet no install spec is present in the registry metadata. This mismatch (source present but no install declared, binaries required but not listed) is inconsistent and worth verifying.
Instruction Scope
SKILL.md instructions are scoped to adding accounts, listing inbox, reading/sending/searching mail, and optionally piping watch output into an OpenClaw system event. The doc explicitly tells users/agents to store app passwords via `nmail config add` and documents that app passwords are saved in ~/.nmail/config.yaml. It also shows integration using an external `openclaw` CLI. The instructions do not request unrelated files or hidden endpoints, but they do instruct the agent to handle sensitive credentials and to call an external 'openclaw' command that is not declared in the skill metadata.
!
Install Mechanism
No install spec is provided in the registry entry despite source files and README claiming install options (brew / go install / clawhub). Because the skill includes source but does not declare how the binary will be installed, the operator or agent would need to build or fetch a binary manually. Building/executing unverified binaries from source or installing a binary from an unspecified source increases risk if you don't control the build/install step.
Credentials
The skill requests no environment variables and does not demand unrelated credentials. However, it persistently stores account passwords (app passwords) in plaintext YAML at ~/.nmail/config.yaml (per code and SKILL.md). That is proportionate to an email client but is sensitive: installing this skill and running the provided commands will place credentials on disk in a local file. Also SKILL.md references piping into `openclaw` (another binary) which is not declared as a required dependency.
Persistence & Privilege
The skill does not request 'always: true' and does not modify other skills or system-wide agent settings. Autonomous invocation is allowed (the platform default) but not an additional red flag here. The primary persistence is local config (~/.nmail/config.yaml) which is normal for an email client.
What to consider before installing
Things to check before installing or enabling this skill: - Verify binary provenance: the registry metadata contains no install spec even though a full Go source tree is included and README suggests 'brew' or 'go install'. If you will run a prebuilt nmail binary, obtain it from a trusted source (official GitHub release or build the source yourself and inspect it). Do not run an unverified binary. - Credentials: nmail stores app passwords in ~/.nmail/config.yaml (0600). That is expected for an email client but is sensitive. If possible, prefer using system keychain storage or ensure the agent process is trusted and the config file is protected. - Declared dependencies mismatch: SKILL.md shows piping watch output into the external 'openclaw' CLI, but the skill metadata does not declare that binary as required. If an agent automates this, ensure the openclaw CLI used is the one you expect. - Build & review: because source is present, consider auditing or building the Go code locally and verifying behavior (especially config file handling and network connections to IMAP/SMTP hosts) before granting runtime access. - If you need lower blast radius: run the nmail binary in an isolated environment (container or dedicated agent role) and avoid giving the agent access to unrelated files or credentials. Given the inconsistencies (missing install spec, undeclared binaries, plaintext config), proceed only after verifying the binary/source and considering how app passwords are stored.

Like a lobster shell, security has layers — review code before you run it.

latestvk9720ewyr4v8bt9famevaye9b9839f7w

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments