cloudflare-mail-address-creator
Analysis
The skill is coherent for creating temporary mail addresses, but it uses an admin mail credential and may return mailbox access tokens/passwords, so users should verify the backend and handle outputs carefully.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Create one or many ordinary email addresses in a Cloudflare temporary mail system through the `/admin/new_address` admin API ... Run [scripts/create_address.py](scripts/create_address.py) for single or batch creation.
The skill intentionally performs a mutating admin API operation, including batch creation. This is disclosed and purpose-aligned, but users should notice the account/backend impact.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
admin_auth = args.admin_auth or os.getenv(ENV_ADMIN_AUTH) ... "x-admin-auth": admin_auth
The helper handles an admin credential to authorize mailbox creation. This is expected for the stated admin API purpose, but it is privileged access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"jwt": data.get("jwt"),
"password": data.get("password")Successful results may include mailbox access material, and the skill instructs the agent to return the script output directly.
