lemlist official

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for Lemlist, but it gives an agent broad API-key authority to send outreach and change or export business data without clear in-skill approval boundaries.

Install only if you trust the publisher and are comfortable giving the agent Lemlist account access. Use a dedicated key if possible, start with a test campaign, and require the agent to preview and get explicit confirmation before sending messages, starting campaigns, deleting or changing records, exporting data, or creating webhooks.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A broad or misunderstood request could cause the agent to send outreach messages, start campaigns, or alter lead and campaign records in Lemlist.

Why it was flagged

The skill teaches a generic raw API helper and documents high-impact send and mutation endpoints, but it does not add confirmation, preview, dry-run, or scoping rules for those operations.

Skill content
def api(path, method="GET", data=None): ... urllib.request.Request(f"{BASE}{path}", data=body, method=method) ... Inbox ... POST email/linkedin/whatsapp/sms
Recommendation

Require explicit user confirmation and previews for message sends, campaign starts, deletes/removals, imports, exports, webhooks, and bulk changes; constrain calls to specific user-approved campaign and lead IDs.

What this means

Anyone or any agent using the configured key may be able to act on the connected Lemlist account according to that key's permissions.

Why it was flagged

The Lemlist API key is expected for the integration, but it represents delegated account access and the registry credential metadata does not fully reflect that requirement.

Skill content
metadata: Primary credential: none; SKILL.md: primaryEnv: LEMLIST_API_KEY ... Authorization: Basic base64(:LEMLIST_API_KEY)
Recommendation

Use a dedicated or least-privilege Lemlist key if available, rotate it when no longer needed, and only install the skill from a publisher you trust.

What this means

If a webhook is pointed at the wrong or untrusted endpoint, lead and campaign data could be exposed outside Lemlist.

Why it was flagged

Webhook creation can transmit lead/contact details to an external URL, and the documented verification is a shared-secret equality check rather than stronger request signing.

Skill content
"targetUrl": "https://your-endpoint.com/webhook" ... "email": "...", "firstName": "...", "variables": {} ... Verification: payload.secret === your_configured_secret (no HMAC).
Recommendation

Create webhooks only to trusted HTTPS endpoints, use a unique shared secret, validate incoming events carefully, and delete unused webhooks.

What this means

A user might trust the integration more than warranted and provide a Lemlist API key without independently verifying the publisher.

Why it was flagged

The artifact presents itself as an official integration, but the supplied metadata does not include a source or homepage that verifies that provenance.

Skill content
Name: lemlist official ... Source: unknown ... Homepage: none
Recommendation

Verify the publisher or installation source through Lemlist or trusted marketplace channels before providing credentials.