Email IMAP/SMTP

ReviewAudited by ClawScan on May 1, 2026.

Overview

The skill is a coherent email automation helper, but it necessarily handles mailbox credentials and can read and send email, so users should review permissions and approve sends carefully.

This appears to be a legitimate IMAP/SMTP email helper, but it will handle sensitive mailbox credentials and can read and send email. Use app-specific passwords or scoped OAuth where possible, verify any custom mail or token endpoints, avoid exposing secrets in chat or logs, and require explicit confirmation before sending messages or attachments.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone or any agent with these credentials may be able to access email and send messages as the user, depending on provider permissions.

Why it was flagged

The skill requires credentials or OAuth material that can grant access to the user's mailbox. This is expected for an IMAP/SMTP skill, but it is sensitive delegated account authority.

Skill content
Authentication: - Password mode: app password / authorization code - OAuth2 mode: access token, or refresh token + client info
Recommendation

Use app-specific passwords or narrowly scoped OAuth tokens where possible, avoid sharing account passwords, and revoke tokens/passwords when no longer needed.

What this means

Granting these scopes may allow the skill to read mail and send messages through the connected account.

Why it was flagged

The documented OAuth scopes allow broad mailbox read/send access for supported providers. These scopes are consistent with IMAP/SMTP workflows, but they are powerful.

Skill content
`gmail`: `https://mail.google.com/` ... `outlook`: `offline_access https://outlook.office.com/IMAP.AccessAsUser.All https://outlook.office.com/SMTP.Send`
Recommendation

Only authorize accounts you intend to automate, review the provider consent screen, and prefer limited or app-specific credentials when available.

What this means

A mistaken recipient, subject, body, or attachment could send private or incorrect information externally.

Why it was flagged

The skill exposes an outbound email-sending operation, including attachments. This is directly aligned with the email automation purpose but can affect other people and external systems.

Skill content
`send`: Send an email with optional HTML and attachments.
Recommendation

Require a final user confirmation of recipients, subject, body, and attachments before sending any email.

What this means

The agent may treat previewing as sufficient and proceed unless the user has clearly required explicit approval.

Why it was flagged

The instructions include a preview step before sending, which is a useful safeguard, but they do not explicitly require the user to approve the preview before delivery.

Skill content
Send email only after previewing key fields (to/subject/body/attachments).
Recommendation

Before installation or use, set an expectation that the agent must ask for confirmation after preview and before invoking the send command.

What this means

If a wrong or untrusted token endpoint is configured, OAuth credentials could be sent to the wrong service.

Why it was flagged

The script can send OAuth refresh-token requests to a provider preset or a user-supplied token endpoint. This flexibility is useful for custom providers but means endpoint choice controls where OAuth secrets are submitted.

Skill content
token_endpoint = args.token_endpoint or os.getenv("EMAIL_TOKEN_ENDPOINT") or oauth_defaults.get("token_endpoint")
Recommendation

Use provider presets when possible, verify custom token endpoints carefully, and do not paste refresh tokens or client secrets into untrusted configurations.

What this means

Users have less external provenance information to rely on when deciding whether to trust a credential-handling skill.

Why it was flagged

The package provenance is not documented in the supplied metadata. This is not suspicious by itself, but users should notice it because the skill handles mailbox credentials.

Skill content
Source: unknown; Homepage: none
Recommendation

Install only if you trust the registry/package source, and inspect the included script before using real mailbox credentials.