my_send_email

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill does send email as described, but it embeds a corporate SMTP password and can send messages from that account without a user-managed credential.

Do not use this skill with the embedded credential as-is. The sender password should be rotated and replaced with a properly declared, user-controlled secret, and users should confirm every email before it is sent.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone with access to the skill artifact may be able to use or extract the SMTP credential and send email as the configured sender account.

Why it was flagged

The skill embeds and uses a fixed SMTP account password rather than a declared, user-supplied, or securely stored credential.

Skill content
sender = "ai_assistant@cloudtrend.com.cn"; password = "..."; server.login(sender, password)
Recommendation

Remove the hardcoded password, rotate the exposed SMTP credential, and require a declared secret mechanism such as a user-provided environment variable, OAuth flow, or credential store with clear scoping.

What this means

If invoked with the wrong recipient or content, the skill can send an unintended external email.

Why it was flagged

The tool sends an external email to the receiver argument. This is expected for the skill, but the artifacts do not show recipient validation, rate limiting, allow-listing, or an explicit confirmation step.

Skill content
msg["To"] = receiver ... server.send_message(msg)
Recommendation

Confirm recipient, subject, and body before sending, and consider adding recipient validation, rate limits, or explicit user approval for each email.