Briefed
Analysis
Briefed is a coherent Gmail newsletter reader, but its local web server appears to expose stored email content through unauthenticated HTTP without an explicit localhost-only bind.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
LaunchAgent is optional convenience for auto-start ... <key>RunAtLoad</key><true/> ... <key>KeepAlive</key><true/>
The artifact provides an optional macOS LaunchAgent that keeps the reader running automatically; it is disclosed and user-directed, not hidden.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Gmail access is **read-only** (`gmail.readonly`). OAuth token is stored locally at `~/.openclaw/workspace/briefed-gmail-token.json`
The skill requires Gmail OAuth access and stores a reusable token; this is disclosed and read-only, but it is still sensitive account access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
app.get('/api/story/:id', ... res.json({ id: story.id, body: story.body || '' }); ... app.listen(PORT, () => { console.log(`📰 Newsletter Reader running at http://localhost:${PORT}`); })The server returns stored email bodies through an HTTP endpoint and starts with only a port number; the artifacts do not show authentication or an explicit 127.0.0.1/localhost bind.
Tracks your interests over time based on what you open and upvote
The skill persistently records reading behavior, notes, and interest signals for later use; this is purpose-aligned but privacy-sensitive.
