Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
smtp-sender
v1.0.2A skill to send emails with support for markdown, HTML text, and attachments, leveraging existing SMTP configuration in `{skill~}/smtp-config.json`. Includes...
⭐ 1· 1k·2 current·2 all-time
byleonard.w@xlbbb-cn
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description (SMTP email sender) aligns with the included Python script which sends email via SMTP. However the SKILL.md and description claim additional capabilities — markdown -> HTML conversion, retry logic, and logging — that are not present in the code. That mismatch indicates the documentation overstates functionality.
Instruction Scope
SKILL.md instructs running the included script and points to a local smtp-config.json for credentials, which matches the code's CONFIG_PATH (script directory). But the doc promises automatic markdown conversion, retries and logging which the script does not perform. The script will read any files passed as attachments or body_file and will send them via the configured SMTP server; if invoked autonomously or with user-supplied paths this could be used to exfiltrate files. The usage examples assume the config file is stored alongside the skill and recommends chmod 600, which is reasonable, but there's no built-in secret protection or validation of attachments.
Install Mechanism
No install spec — instruction-only with a small Python script. Nothing is downloaded or written to disk by an installer. This is the lowest install risk.
Credentials
The skill requests no environment variables. SMTP credentials are expected in a local smtp-config.json file (username/password in plaintext). That is proportionate to sending mail but has security implications: secrets are stored in cleartext within the skill directory instead of a secret store or env var. No unrelated credentials are requested.
Persistence & Privilege
always:false and default agent-invocation behavior. The skill does not request persistent system-wide privileges or modify other skills. The main risk relates to what the script can send if invoked autonomously (it can read and attach arbitrary file paths passed to it).
What to consider before installing
What to consider before installing:
- The script does send email via SMTP using credentials stored in smtp-config.json next to the skill; those credentials are plaintext in that file. Consider storing SMTP credentials in a secret manager or environment variables rather than a repo file.
- SKILL.md promises markdown-to-HTML conversion, retry logic, and logging — none of these are implemented. If you need those features, review and update the code (add a markdown library, add retry/error-handling and persistent logging) before relying on it.
- The script will attach any file paths you supply. If you allow automatic or autonomous invocation, be careful: an agent could be instructed to attach and send arbitrary local files (risk of data exfiltration). Restrict autonomous use or add path whitelisting and validation.
- The example config contains placeholder credentials and an internal IP — treat it as an example only. Ensure file permissions (chmod 600) and that the skill directory is not world-readable.
- If you want to use this skill safely: audit the code, implement missing features properly (markdown conversion, retries, logging), move credentials to a secret store or environment variables, add explicit input validation for attachment paths, and restrict autonomous invocation or require explicit user confirmation before sending.
Confidence note: high — the code is small and the mismatches between documentation and implementation are clear. There are no signs of network C2 endpoints or obfuscated code, but the feature/documentation inconsistencies and plaintext credential handling are noteworthy.Like a lobster shell, security has layers — review code before you run it.
latestvk97fp144205xt78s78xyxnje1n82782d
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
