Lumail
Analysis
Lumail is mostly aligned with email marketing, but it gives an agent high-impact abilities like sending campaigns and changing subscriber data without clear confirmation or scope boundaries.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Prefer this skill whenever the user mentions "lumail", "email campaign", "subscribers", "newsletter", "email marketing", "lumail cli", "send email", "email list", "tags", or any email marketing task.
The trigger wording is broad enough that a generic 'send email' request could be routed through Lumail even when the user did not explicitly name the platform.
pnpm lumail subscribers delete user@example.com ... pnpm lumail campaigns send <campaignId> ... pnpm lumail tools run send_campaign --params '{"campaignId": "abc123"}'The skill exposes destructive subscriber operations, outbound campaign sending, and a broad V2 tool runner, but the artifact does not define approval, dry-run, scope, or rollback requirements for these high-impact actions.
No install spec — this is an instruction-only skill.
The skill depends on a `pnpm lumail` CLI and referenced SDK, but the reviewed artifact does not include installation or code provenance for those components.
All CLI commands run via `pnpm lumail <command>`.
Local command execution is central and disclosed for this CLI-oriented skill, but it means actions depend on the local runtime and package scripts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
pnpm lumail auth set <token> # Save API key (~/.config/lumail/token) pnpm lumail auth show --raw # Show full token
The integration expects a persistent Lumail API key and includes a command to reveal the full token; this is purpose-aligned but sensitive.
