Ride Receipts

PassAudited by ClawScan on May 1, 2026.

Overview

This skill is coherent and transparent, but it handles sensitive Gmail ride receipts, locations, and payment details that will be stored locally and sent to the selected Gateway-backed model.

Before installing, confirm you are comfortable granting the agent access to the selected Gmail account's ride receipts and sending raw receipt content to your Gateway-backed model. Use a narrow date range when possible, keep the output directory private, and avoid sharing the generated database or CSV without reviewing the fields.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent can fetch ride receipt emails from the selected Gmail account, revealing travel, spending, and account information within the chosen scope.

Why it was flagged

The skill relies on an already-authenticated Gmail CLI account and enumerates configured accounts before fetching receipts, which is sensitive account access but directly tied to the stated Gmail receipt purpose.

Skill content
Require `gog` CLI authenticated for the target Gmail account. Always run `gog auth list` before fetching...
Recommendation

Confirm the Gmail account and date range carefully, and only run this with a gog profile you trust the agent to use for receipt access.

What this means

Receipt contents may be processed by the active Gateway-backed model, so any non-local or misconfigured Gateway could expose sensitive trip details.

Why it was flagged

Raw email JSON/HTML is sent to the configured OpenClaw Gateway /v1/responses endpoint with a bearer token for extraction. The code defaults to localhost/private hosts and refuses untrusted hosts unless overridden.

Skill content
prompt = SYSTEM_PROMPT + "\n\nEmail JSON:\n" + json.dumps(email_obj, ensure_ascii=False) ... Request(f'{base_url}/v1/responses' ... 'Authorization': f'Bearer {token}'
Recommendation

Use a loopback or trusted private Gateway, avoid non-local Gateway URLs unless you explicitly accept the data flow, and protect the Gateway token.

What this means

Local files may contain travel routes, timestamps, amounts, payment details, and full receipt HTML that other local users, backups, or sync tools could access.

Why it was flagged

The workflow persistently stores raw fetched receipt emails locally, along with extracted ride records and a SQLite database.

Skill content
`data/gateway-llm/emails.json` — fetched receipt emails in one JSON array; may include full HTML receipt content
Recommendation

Store the output in a protected location, avoid syncing it unintentionally, and delete emails.json when it is no longer needed.

What this means

A user might treat the CSV as safe to share even though it can still expose sensitive movement and spending patterns.

Why it was flagged

The export is labeled anonymized but still includes city-level locations, rounded times, months, and amounts, which can reveal travel patterns if shared.

Skill content
description="Export anonymized rides CSV" ... "email_month", "start_time_15m", "amount", "pickup_city", "pickup_country", "dropoff_city", "dropoff_country"
Recommendation

Treat the export as de-identified rather than fully anonymous, and review the fields before sharing it.