Email Daily Summary Zc

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill’s email-summary purpose is clear, but it asks for broad control of logged-in email browser sessions, optional AI processing of email content, and scheduled background runs without enough scoping or credential safeguards.

Review carefully before installing. Only use this with accounts you are comfortable exposing to browser automation, do not type passwords into command-line examples, avoid optional AI extraction unless you understand where email content is sent, and set up cron/launchd only if you want ongoing daily background access.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could access email as the logged-in user, and entering a password on the command line can expose it through shell history, logs, or process inspection.

Why it was flagged

The skill directs use of existing logged-in email browser sessions and shows password entry as a CLI argument. Email sessions and passwords are high-impact authority, and the artifacts do not define a read-only account boundary or safe credential-handling control.

Skill content
使用 `--browser real` 模式可以复用你 Chrome 浏览器中已登录的邮箱会话 ... `browser-use input <password_input_index> "your-password"`
Recommendation

Avoid command-line passwords, prefer provider-approved OAuth/app-specific read-only access, and require explicit user confirmation for any account access.

What this means

A mistaken or manipulated browser automation step could operate inside the user’s logged-in mailbox with more power than just reading messages for a summary.

Why it was flagged

The allowed tool scope is a wildcard for browser-use, and the instructions include raw JavaScript/Python execution against webmail pages. This is broader than a constrained summary workflow and lacks documented approval gates for non-read actions.

Skill content
allowed-tools: Bash(browser-use:*) ... `browser-use eval "... document.querySelectorAll('tr.zA') ..."` ... `browser-use python "... browser.scroll('down') ..."`
Recommendation

Restrict allowed browser commands to the minimum needed for read-only summarization and require confirmation before clicks, form input, downloads, deletions, sends, or other mutations.

What this means

Email sender names, subjects, snippets, or summaries may leave the local browser environment for AI processing.

Why it was flagged

The AI extraction step could route sensitive email metadata/snippets through an external browser-use or AI provider, but the artifacts do not identify the provider, retention policy, or data minimization boundaries.

Skill content
如果配置了 API Key,可以使用 AI 自动生成邮件摘要 ... `browser-use extract "提取前 10 封邮件的发件人、主题和摘要,按重要性排序"`
Recommendation

Clearly disclose the AI/provider destination and retention behavior, ask for consent before sending email content, and minimize or redact sensitive data.

What this means

Email details may remain on disk in screenshots or logs after the summary is generated.

Why it was flagged

The workflow stores screenshots and logs derived from email content. This is aligned with generating summaries, but the stored files may contain sensitive mailbox information and no retention or protection guidance is provided.

Skill content
`OUTPUT_DIR="./email_summaries"` ... `browser-use screenshot "$OUTPUT_DIR/inbox_$DATE.png"` ... `StandardOutPath` `/tmp/email_summary.log`
Recommendation

Store outputs in a user-approved private location, avoid logging sensitive content, and provide cleanup/retention instructions.

What this means

The summary job can keep running every day in the background after setup.

Why it was flagged

The skill documents cron and launchd scheduling for daily execution. This is disclosed and purpose-aligned, but it is persistent automation that continues reading/logging email-derived data until removed.

Skill content
`0 9 * * * /path/to/email_daily_summary.sh >> /path/to/logs/email_summary.log 2>&1` ... `launchctl load ~/Library/LaunchAgents/com.email.dailysummary.plist`
Recommendation

Provide clear unload/disable commands, make scheduling opt-in, and remind users where logs and summaries are stored.

What this means

Users may install a moving third-party dependency before using the skill.

Why it was flagged

The skill depends on installing an external browser automation CLI, but the package/version is not pinned and the registry requirements list no required binaries or install spec.

Skill content
`uv pip install browser-use[cli]` ... `browser-use install`
Recommendation

Declare the dependency in metadata, pin known-good versions, and document the trusted package source.