Outlook Pywin32
v0.8.0通过pywin32本地操作Outlook的命令行工具。支持邮件管理、日历管理等功能。使用命令: outlook-pywin32.py <方法名> --参数 值
⭐ 0· 440·1 current·1 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description promise local Outlook automation via pywin32. The bundled Python modules use win32com.client to enumerate accounts, read/write mail and calendar items, and list folders — which matches the declared functionality.
Instruction Scope
SKILL.md tells the agent to run the local Python CLI and documents methods and parameters. Runtime behavior is limited to local Outlook COM automation (reading/saving/mutating messages and calendar items) and reading an optional config.json or OUTLOOK_ACCOUNT environment variable. There are no instructions to read unrelated system files or send data to external endpoints.
Install Mechanism
There is no packaged installer; the README/SKILL.md recommends pip install pywin32 and running the script. No remote downloads, archive extraction, or external installers are used by the skill itself.
Credentials
The repository metadata lists no required env vars, but the code and documentation use an optional OUTLOOK_ACCOUNT environment variable and a local scripts/config.json. This is a minor inconsistency (the env var is optional and reasonable for the purpose) but worth noting because the declared 'required env' is empty while runtime code may read OUTLOOK_ACCOUNT.
Persistence & Privilege
always is false and the skill does not request persistent platform privileges or modify other skills. It operates on the local Outlook client only and requires user invocation.
Assessment
This tool automates your local Outlook client: it will read message metadata and bodies, mark messages as read, save drafts, and create/modify calendar items. Before installing/running: 1) Confirm you trust the source — the package owner is unknown. 2) Review the code (it is included) if you have sensitive mail, because the script has full local Outlook access via COM. 3) Expect Outlook to show security prompts when automated access occurs. 4) Note the optional OUTLOOK_ACCOUNT env var and scripts/config.json are used for default account selection (metadata did not declare any required env vars). 5) There are no network calls or hidden endpoints in the code, but if you are cautious, run it with a non-production account or inspect/modify the code to restrict actions (e.g., disable writing operations). 6) Ensure you have Python and pywin32 installed on Windows and run in a safe environment if you are unsure.Like a lobster shell, security has layers — review code before you run it.
latestvk97btttv63rzvk51kpr3hw2yw9830azk
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
