Agent Burner
v0.2.1Disposable email API. Use when you need a temporary email address -- receiving mail, reading contents, extracting URLs. Triggers include "create a temp email...
⭐ 0· 96·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
medium confidencePurpose & Capability
Name/description describe a disposable email service and the SKILL.md only documents using https://api.agentburner.com endpoints to create/list/read/delete inboxes. There are no unexpected environment variables, binaries, or install steps required that would contradict the stated purpose.
Instruction Scope
Runtime instructions are limited to calling the service's REST endpoints and parsing returned fields (address, key, entries, urls, body, html). The SKILL.md does not instruct the agent to read local files, other env vars, or transmit data to unrelated endpoints.
Install Mechanism
No install spec and no code files — instruction-only skill. No downloads, no archive extraction, no third-party package installs. Lowest-risk install posture for a skill.
Credentials
The skill requests no environment variables, credentials, or config paths. The only credential concept is the inbox key returned by the API, which is consistent with the described service.
Persistence & Privilege
Skill is not always-enabled and uses default agent invocation settings. It does not request persistent system-wide configuration or modify other skills' settings.
Assessment
This skill is coherent with its description, but consider these practical risks before installing: the agent will call a third-party API (api.agentburner.com) and any email content retrieved via that API will be processed by your agent — do not use it for sensitive inboxes or verification codes you care about unless you trust the provider. Because inbox keys grant access to received mail, treat keys as secrets in your workflows. Also note the service is public/no-auth; anyone with a key or the created address could access messages until the inbox expires. If you need stronger guarantees (auditability, retention, privacy), use a vetted paid provider or your own controlled service.Like a lobster shell, security has layers — review code before you run it.
apivk970hrn9s1hj69jw5z6kacfrhh837d50burnervk970hrn9s1hj69jw5z6kacfrhh837d50disposablevk970hrn9s1hj69jw5z6kacfrhh837d50emailvk970hrn9s1hj69jw5z6kacfrhh837d50inboxvk970hrn9s1hj69jw5z6kacfrhh837d50latestvk970hrn9s1hj69jw5z6kacfrhh837d50no-authvk970hrn9s1hj69jw5z6kacfrhh837d50otpvk970hrn9s1hj69jw5z6kacfrhh837d50temp-mailvk970hrn9s1hj69jw5z6kacfrhh837d50verificationvk970hrn9s1hj69jw5z6kacfrhh837d50
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
