Gmail
Analysis
This is a coherent Gmail integration that uses ClawLink for account connection and email actions, but users should notice that it grants sensitive mailbox access and can send or modify email after confirmation.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
For sends, replies, forwards, draft creation, label changes, archive/delete actions, signature changes, or anything marked as requiring confirmation, call `clawlink_preview_tool` first, then confirm with the user.
The skill can invoke tools that send or alter email. The artifact includes appropriate preview and confirmation safeguards, so this is purpose-aligned rather than a concern.
Install the verified ClawLink plugin: `openclaw plugins install clawhub:clawlink-plugin`
The skill depends on an external plugin that is not included in the scanned artifact set. The installation is user-directed and aligned with the skill purpose, but the plugin itself is outside this review.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Tell the user to open https://claw-link.dev/dashboard?add=gmail and connect Gmail there... Google sign-in and consent.
The skill requires delegated Gmail account access through a third-party connection flow. This is expected for a Gmail tool, but it gives the integration authority over sensitive mailbox data and actions within the approved scopes.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Powered by [ClawLink](https://claw-link.dev), an integration hub for OpenClaw that handles hosted connection flows and credentials... The resulting device credential is stored locally in OpenClaw's plugin config and is only sent to `claw-link.dev`.
Gmail access and device credentials are mediated through the ClawLink provider. This data flow is disclosed and expected, but it involves sensitive credentials and email data crossing a third-party integration boundary.
