Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
email-cron-handler
v1.0.0邮件指令定时处理任务。通过 IMAP/SMTP 自动接收并执行邮件中的指令,以邮件形式回复执行结果。适用于:(1) 创建定时任务监控指定邮箱 (2) 通过邮件下发指令给 AI Agent (3) 实现邮件驱动的自动化工作流。需配置:收件邮箱、SMTP/IMAP 配置、指令发件人白名单。
⭐ 0· 164·0 current·0 all-time
by王浩楠@pebblerwon
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The files (SKILL.md, config template, and process_email.py) match the stated purpose: fetching IMAP mail, filtering by sender, replying via SMTP, and enabling email-driven automation. However, the design mixes two execution paths: (a) a benign helper script that only fetches/replies, and (b) explicit agent/LLM payload templates that instruct the model to 'execute the instruction' found in email. Requiring the agent to execute arbitrary emailed instructions broadens capability beyond what a conservative 'mail fetch/reply' helper would need.
Instruction Scope
SKILL.md and the reference template explicitly tell the LLM to read local processed_emails.json, fetch up to 50 messages, parse the email body as an instruction, '尝试执行该指令(查询天气/搜索信息/执行操作等)', and always reply. That grants the agent very broad discretion to perform arbitrary tasks derived from potentially untrusted email content. The cron/payload examples embed full IMAP/SMTP credentials into the agent turn payload, which would transmit secrets to whatever cron/agent execution system handles that payload.
Install Mechanism
No install step or networked downloads are used; this is an instruction-only skill with one local Python script. That minimizes installer risk (nothing downloaded/extracted), but the code and instructions still request/handle secrets and schedule autonomous runs.
Credentials
The skill asks you to store your email and password/authorization code in a plaintext config.json and to embed those values into cron payloads. While IMAP/SMTP credentials are functionally needed to read/send email, the skill does not use secure secret storage or recommend safe practices, and the cron payload design causes credentials to be placed in scheduler metadata and in the agent turn (likely visible to logs or an execution service). The skill also does not declare these as required env vars (it uses a local file), which reduces clarity about where secrets will live.
Persistence & Privilege
always:false, but the provided cron examples schedule autonomous agent turns that include credentials and instructions to execute arbitrary commands. Regular autonomous invocation with embedded secrets materially increases blast radius (credentials could be logged, stored, or observed by the scheduler/execution environment). The skill does not modify other skills or system configs, but its recommended scheduling practice is risky.
What to consider before installing
This skill will read a mailbox and can cause your agent to execute instructions embedded in emails; that is powerful but also dangerous if misused. Before installing or running it:
- Do not place real/privileged credentials in plaintext config.json or pass them in cron payloads. Use an app-specific token, a dedicated throwaway mailbox, or a secure secret store (OS keychain / secrets manager) and avoid embedding secrets in scheduler payloads or agent turns.
- Prefer the provided Python script (fetch/reply) to run in a tightly sandboxed environment and avoid giving the LLM direct authorization to 'execute' commands. If you must automate, restrict the allowed command set to a whitelist of safe operations and implement explicit parsing/validation rather than treating the whole email body as executable instructions.
- Avoid scheduling regular autonomous agent turns that include secrets; if using a scheduler, ensure payloads do not contain credentials and that the execution environment enforces strict egress/network controls and logging policies.
- Use a dedicated, low-privilege mailbox for testing; rotate credentials often; log and monitor outgoing SMTP activity.
- If you want to proceed safely, request changes from the skill author (or modify locally): remove credential embedding in cron payloads, make whitelist_sender an explicit list, implement explicit allowed-command parsing, and store secrets in a secure store.
Confidence is high that these are genuine risks (design choices rather than mere bugs). Additional information that would reduce risk: (1) confirmation that the agent never receives credentials in runtime payloads and that only the local script runs (no LLM execution), (2) use of secure secret storage for IMAP/SMTP credentials, and (3) an allowlist of permitted commands with sandboxing for any action the agent performs.Like a lobster shell, security has layers — review code before you run it.
latestvk97bgfrd38cbzg96kw3ztqbscn82y89t
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
