Gws Skill
Analysis
This is a clearly disclosed Google Workspace investigation skill, but it grants very broad domain-wide delegated access to read users’ email, files, calendars, contacts, and audit data, with a misleading read-only claim around Vault authority.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Read-only access — no write scopes are granted ... vault.py — Email Investigation ... Creates temporary matter → runs query → returns results → auto-deletes matter ... --export
The skill claims no write scopes are granted, but its own Vault workflow describes creating and deleting matters and exporting results, which can make the authority sound narrower than it is.
elif args.mode == "full":
result = search_and_read(args.user, args.query, args.max)The Gmail tool can return full message contents for an impersonated user; this is purpose-aligned, but it is a high-sensitivity action without a built-in confirmation or narrowing control in the script.
google-auth google-auth-httplib2 google-api-python-client
The dependencies are relevant to the skill, but they are unpinned, so future installs could receive different package versions.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
GCP service account JSON key with domain-wide delegation. Grants read-only access to Gmail, Vault, Drive, Calendar, Sheets, Docs, Directory, Reports, and People APIs for any user in the Google Workspace domain.
Domain-wide delegation for any user in the domain gives the skill very broad delegated authority over sensitive organizational data, even if intended for admin investigations.
