Commune — Agent Email Inbox

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is a coherent email-inbox integration, but it gives an agent persistent external email powers and broad API-key access that are not tightly scoped or fully reflected in the metadata.

Install only if you intentionally want an agent to operate a dedicated external email inbox. Use a separate low-privilege API key and inbox, require confirmation before sending email or changing account state, avoid routing sensitive mail to it unless you trust the provider, and review the unpinned Python/MCP dependencies before use.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could send emails or change email workflow state in ways that affect real people, organizations, or the user’s reputation.

Why it was flagged

The skill invites autonomous external email activity, but the artifacts do not define approval, recipient, volume, or content-review limits before an agent sends or modifies email workflows.

Skill content
need to send or receive email autonomously ... automate any email workflow entirely via curl
Recommendation

Require explicit user confirmation for sending emails, adding webhooks, changing domains/inboxes, or bulk triage actions; use a dedicated inbox with narrow permissions.

What this means

Installing or invoking the skill may grant the agent account-level email authority that users may not notice from the registry metadata alone.

Why it was flagged

The skill requires a bearer API key with broad read/write access over domains, inboxes, threads, messages, and attachments, while the registry metadata says no primary credential or required env var.

Skill content
Requires `COMMUNE_API_KEY` env var ... Permission scopes on API keys: `domains:read` `domains:write` `inboxes:read` `inboxes:write` `threads:read` `threads:write` `messages:read` `messages:write` `attachments:read` `attachments:write`
Recommendation

Declare the credential and capabilities in metadata, use least-privilege API keys if supported, and avoid giving this skill keys for important business or personal mailboxes.

What this means

Private email content could become persistent agent context and be processed for search or extraction beyond the immediate task.

Why it was flagged

The skill stores email as long-term agent memory and processes inbound content with semantic search/extraction, but the artifacts do not clearly bound retention, reuse across tasks, or sensitive-data handling.

Skill content
Your inbox is persistent across every session — it's your long-term memory ... Commune uses vector embeddings (Qdrant + Azure OpenAI) ... Every inbound email is automatically parsed into structured fields by AI
Recommendation

Use only a dedicated inbox, avoid sensitive personal or regulated data unless you trust the provider’s retention and processing practices, and document deletion/retention controls.

What this means

The installed code may depend on whatever versions are current at install time.

Why it was flagged

The install guide uses unpinned external packages and a mutable remote tarball path. These steps are user-directed and purpose-aligned, but provenance is not pinned in the artifacts.

Skill content
pip install commune-mail ... pip install commune-mcp ... curl -L "$tarball_url" | tar -xz -C "$dest"
Recommendation

Pin package versions or review the external packages before installation, especially the optional MCP server.

What this means

If webhook verification or routing is implemented poorly, inbound email could trigger unintended automation.

Why it was flagged

Webhook integration is disclosed and includes HMAC verification guidance, but it can trigger downstream automation from inbound email and should be treated as an agent communication boundary.

Skill content
Set Webhook ... endpoint="https://your-app.com/webhook" ... Receives a `POST` with signed payload when emails arrive. Verify with `verify_signature()`.
Recommendation

Verify webhook signatures, restrict webhook endpoints, and avoid automatically acting on inbound email without validation.