Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Invoice Collector

v1.2.0

Collect invoices/receipts from Gmail and send a summary email with attachments. Automatically downloads PDF attachments or takes screenshots of emails withou...

2· 700·1 current·1 all-time
byminta@mintannn
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (collect invoices from Gmail, summarize, forward attachments) lines up with the included script and SKILL.md: it requires gogcli for Gmail access, jq for JSON parsing, and node/puppeteer for HTML screenshots. The resources requested are broadly appropriate for the stated purpose.
Instruction Scope
Instructions and the script operate directly on the user's Gmail account (search, read message bodies, download attachments, render HTML, and send email). This is expected for an invoice-gathering tool. The SKILL.md explicitly instructs rendering HTML via Puppeteer (with --no-sandbox) and exporting keyring passwords for gog, which increases operational risk and should be treated carefully.
Install Mechanism
The skill is instruction-only (no platform install spec), but SKILL.md recommends installing gogcli via a curl | tar pipeline and installing puppeteer via npm. The GitHub releases URL is a common source (better than an unknown host), but piping into tar and npm-installing Puppeteer (which downloads Chromium) carry supply-chain and local-execution risks unless checksums or package manager installs are used. The SKILL.md itself recommends verifying checksums or using brew on macOS.
!
Credentials
Registry metadata listed no required env vars, but SKILL.md documents GOG_ACCOUNT and GOG_KEYRING_PASSWORD; the script also expects a config.json with account/destination fields. The skill requires OAuth credentials (Gmail access) via gogcli — a sensitive capability. Asking users to export GOG_KEYRING_PASSWORD on the shell can expose secrets via shell history. The number and type of credentials are proportionate to the function, but the metadata mismatch and advice to export a keyring password are concerns.
Persistence & Privilege
The skill is not always-enabled and does not request persistent system-wide privileges. It runs as a user process, uses temporary directories under /tmp (unique name), and deletes them at the end. It does not modify other skills or system-wide agent config.
Assessment
This skill appears to do what it claims, but take these precautions before installing or running it: - Gmail access is required: the skill uses gogcli OAuth tokens to read/send your mail. Only grant this to an account you trust and understand the scope (read and send). Treat those tokens as highly sensitive. - Avoid exporting passwords on the command line. SKILL.md suggests exporting GOG_KEYRING_PASSWORD; doing that writes secrets into shell history. Prefer using a config file or secure keyring prompts instead. - Puppeteer runs Chromium with --no-sandbox (documented). Rendering arbitrary email HTML without a sandbox increases risk; run this in an isolated environment (dedicated VM/container) if you process untrusted senders. - Verify gogcli install sources: the examples use GitHub releases (common), but do not pipe unverified archives blindly — follow the SKILL.md guidance to verify checksums or use your OS package manager. - Inspect the included script (scripts/collect_invoices.sh) and test on a limited mailbox subset before running broadly. Confirm the destination email address in the config to avoid accidental data leakage. If you want higher assurance, ask the maintainer for (1) a declared list of required environment variables in the registry metadata to match SKILL.md, (2) a verified install method (checksums or package manager), and (3) an option that avoids sending keyring passwords via env variables.

Like a lobster shell, security has layers — review code before you run it.

latestvk979cgdqjd726rcspk7k5h2n9581hwse

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🧾 Clawdis
Binsgog, node, jq

Comments