Gmail OAuth Setup

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If authorized, gog can access the selected Gmail account with read, send, delete, and label-management permissions until the token is revoked.

Why it was flagged

The helper requests Gmail modify access and imports a refresh token into gog, creating persistent delegated Gmail access.

Skill content
SCOPE="https://www.googleapis.com/auth/gmail.modify" ... "refresh_token": "${refresh_token}" ... gog auth tokens import "$token_file"
Recommendation

Use the least-privileged Gmail scope that works for your use case, authorize only accounts you intend to connect, and revoke the token from your Google Account if you no longer need it.

What this means

The OAuth flow relies on the behavior and security of the installed gog CLI.

Why it was flagged

The skill depends on an external CLI installed outside the skill package; this is disclosed, but users must trust that dependency and source.

Skill content
`gog` CLI installed (`brew install steipete/tap/gogcli`)
Recommendation

Install gog only from a trusted source, verify the project and package before use, and keep it updated.

What this means

A user who proceeds with the wrong OAuth app could grant Gmail access to an untrusted Google Cloud project.

Why it was flagged

The instructions tell users how to proceed past Google's warning; this is reasonable for a personal OAuth app but should not be followed for an app the user does not control.

Skill content
"Google hasn't verified this app" ... "Go to [app name] (unsafe)" ... "Safe to proceed since you own the app."
Recommendation

Only bypass the warning when you created and control the Google Cloud OAuth client and have verified the app name, client, and requested scopes.