email-skill

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill’s email-sending purpose is clear, but it publishes a live SMTP password that lets anyone with the skill send mail as the listed account.

Do not install this as-is unless you own and intend to share the listed SMTP account. The exposed email authorization code should be rotated and replaced with a user-specific secret, and the agent should confirm recipient, subject, body, and sender before every email is sent.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The account could be used to send unwanted or unauthorized email, harming the sender account’s reputation and creating accountability issues for users who install the skill.

Why it was flagged

The artifact embeds a live SMTP authorization code for a real sender account, giving account-level sending authority to anyone who can read or copy the skill.

Skill content
Account (From / login user) | `validates@yeah.net` ... Client authorization code (SMTP password) | `LWyx439…U68u` ... Anyone with read access ... can send mail as `validates@yeah.net`.
Recommendation

Rotate the exposed SMTP authorization code, remove it from SKILL.md, and require each user to provide their own credential through a secret store or environment variable with clear scope and ownership.

What this means

If invoked incorrectly, the agent could send mistaken, unwanted, or sensitive messages from the configured account.

Why it was flagged

The instructions enable the agent to send arbitrary email content to arbitrary recipients. This matches the skill purpose, but sending email is an externally visible action that lacks an explicit confirmation or allowlist in the artifact.

Skill content
Flow the agent should follow: 1. Write the file ... 2. Run: `python3 /tmp/send_email.py "recipient@domain" "Subject line" "Plain text body"`
Recommendation

Require an explicit user confirmation that previews the recipient, subject, body, and sender before every send, and consider recipient/domain restrictions or rate limits.

What this means

The generated script may remain on disk and contains the SMTP credential, so local readers of that file could reuse the account.

Why it was flagged

The skill’s execution model is disclosed and purpose-aligned, but it depends on generating and running a local script rather than shipping reviewed code.

Skill content
the agent writes a standalone Python file (for example `/tmp/send_email.py`), runs `python3 /tmp/send_email.py …`, and relies on stdlib only
Recommendation

Prefer a reviewed helper that reads credentials from a secret source, or create the temporary script with restrictive permissions and delete it immediately after use.