eMail manager lite

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: email-manager-lite Version: 1.0.1 The skill is classified as suspicious due to a significant security vulnerability found in `scripts/email.js`. The IMAP configuration includes `tlsOptions: { rejectUnauthorized: false }`, which disables certificate validation for TLS connections. This makes the email client vulnerable to Man-in-the-Middle (MITM) attacks, allowing an attacker to potentially intercept user credentials (`EMAIL_USER`, `EMAIL_PASS`) and email content without detection. While the skill itself does not exhibit clear intentional malicious behavior like exfiltration, this configuration exposes users to a high risk of data compromise.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A network attacker or impersonated IMAP endpoint could potentially capture mailbox credentials or expose email contents.

Why it was flagged

The script authenticates to IMAP/SMTP with the user's email password or app password, while the IMAP configuration disables server certificate verification.

Skill content
const EMAIL_PASS = process.env.EMAIL_PASS; ... tlsOptions: { rejectUnauthorized: false }
Recommendation

Remove `rejectUnauthorized: false` by default, make any self-signed-certificate mode an explicit opt-in warning, and declare EMAIL_USER/EMAIL_PASS as credential requirements in metadata.

What this means

If invoked with the wrong recipient, body, UID, or folder, the agent could send an unintended email or move the wrong message.

Why it was flagged

The skill can send outbound email and move mailbox messages when invoked. This matches the stated purpose, but these are high-impact account actions.

Skill content
await transporter.sendMail({ from: EMAIL_USER, to, subject, text }); ... await connection.moveMessage(uid, targetFolder);
Recommendation

Use this skill only with explicit user confirmation for send and move operations, and verify recipients, message content, UIDs, and target folders before running commands.

What this means

Dependency changes or compromised packages could affect code that has access to mailbox data and credentials.

Why it was flagged

The documented npm install will fetch third-party packages using semver ranges. This is expected for the Node email functionality, but the dependency chain handles email credentials and message content.

Skill content
"dependencies": { "imap-simple": "^5.1.0", "mailparser": "^3.9.3", "nodemailer": "^7.0.13" }
Recommendation

Pin dependency versions with a lockfile, install from trusted registries, and review dependency updates before using the skill with real email credentials.

What this means

Sensitive email text may enter the agent context, and malicious emails could try to influence the agent if treated as instructions.

Why it was flagged

Read/search commands print email headers and body previews into the agent-visible output. Email content is private and may also contain untrusted instructions.

Skill content
console.log(`From: ${mail.from.text}`); ... console.log(`\n📝 Body:\n${mail.text.substring(0, 500)}${mail.text.length > 500 ? '...' : ''}`);
Recommendation

Treat retrieved email content as data, not instructions; avoid broad searches unless needed, and redact sensitive message content before sharing it further.