Back to skill
Skillv1.0.0

ClawScan security

Email Security · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignFeb 11, 2026, 9:26 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, documentation, and runtime instructions are consistent with an email-security tool and do not request unrelated credentials or installers.
Guidance
This skill appears coherent and appropriate for protecting agents that handle email. Before installing, consider: (1) the scripts will read and write local files (e.g., references/owner-config.md) and can save attachments to disk — run them in an environment with only the minimum file-system permissions you allow; (2) the skill will prompt you to supply an owner email and persist it into the repo/config — verify this is acceptable and back up any existing owner-config.md you care about; (3) review blocked/allowed extensions in assets/security-config-template.json and parse_email.py (they block .py, .jar, etc.) to ensure policies match your needs; (4) although provider docs mention OAuth/API keys, the skill does not require credentials by default — if you adapt it to integrate with Gmail/IMAP/AgentMail, follow best practices for storing credentials (encrypted, scoped, rotated); and (5) if you plan to enable autonomous invocation, be aware the skill can be triggered by agent workflows — test with non-production mailboxes first. Overall, the bundle looks consistent with its stated purpose; review and test in a safe environment before production use.
Findings
[prompt-injection:ignore-previous-instructions] expected: SKILL.md and threat-patterns.md intentionally contain sample injection payloads (e.g., 'ignore previous instructions') because the skill detects such patterns. The pre-scan flag is a likely false positive in this context but is surfaced correctly by the scanner.

Review Dimensions

Purpose & Capability
okName/description (email security: sender verification, sanitization, attachment policy) match the included scripts and reference docs. The files present (parse_email.py, sanitize_content.py, verify_sender.py, provider references, policy templates) are appropriate and proportional to the stated purpose. No unexpected cloud credentials or unrelated binaries are requested.
Instruction Scope
okSKILL.md workflow confines actions to parsing EML content, verifying headers, sanitizing text, and applying attachment rules. The instructions do ask the agent to prompt for an owner email and update references/owner-config.md (i.e., write its own config), which is expected for a config-driven security tool. No steps instruct the agent to read unrelated system files or send data to external endpoints.
Install Mechanism
okNo install spec is provided (instruction-only installation), which minimizes supply-chain risk. Scripts are included in the bundle; they run locally and do not download remote artifacts or create installers. This is a low-risk delivery model.
Credentials
okThe skill declares no required environment variables or credentials. Provider docs reference normal credential handling (OAuth, API keys) as guidance only; the skill itself does not request them. That is proportionate to its described functionality.
Persistence & Privilege
okThe skill does not set always:true and uses normal autonomous invocation defaults. It does instruct the agent to persist the owner email into references/owner-config.md and agent memory (its own configuration file), which is reasonable for a security policy tool. It does not attempt to modify other skills or system-wide agent settings.