Openclaw Email Bypass
Analysis
The skill mostly matches its email-relay purpose, but it can send mail as you through a public Google Apps Script endpoint and the relay code it tells you to deploy is missing from the package.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
You can use the provided script to send emails from any sub-agent or task
The artifacts explicitly encourage agent/sub-agent use of an email-sending function, but do not document confirmation, allowlists, rate limits, or other controls around external email delivery.
`assets/Code.gs`: The Google Apps Script source code.
The documentation relies on assets/Code.gs as the core relay source, but the provided manifest does not include that file, so the relay code and its token checks are not backed by the included artifacts.
User-Owned Infrastructure: You deploy the relay on your own Google account. No third-party servers see your data.
The skill discloses Google Apps Script, but this wording may overstate privacy because the relay and mail delivery still use Google-hosted services.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Execute as: **Me**. Who has access: **Anyone** (The `AUTH_TOKEN` protects it).
The relay is intended to run with the user's Google identity while being reachable as a public web app; access control depends on a shared token.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`"token": token` ... `response = requests.post(url, json=payload)`
The client sends the email contents and bearer token to the configured GOOGLE_SCRIPT_URL. This is purpose-aligned, but it is a sensitive webhook-style data boundary.
