Scan Report
62 /100
Email Analyzer
Analyzes, backs up, and deletes emails from [email protected] based on keyword filtering
The skill contains hardcoded credentials (email authorization code) in plaintext within source code and documentation, presenting significant credential exposure risk if the repository becomes public or is shared.
Do not install this skill
Remove hardcoded credentials from source code. Use environment variables or a secrets manager (e.g., .env file with .gitignore) to store the authorization code. The SKILL.md should reference environment variables rather than exposing the actual credential.
Attack Chain 3 steps
⬡
Escalation Attacker obtains repository or accesses skill files
SKILL.md:1⬡
Escalation Attacker extracts hardcoded authorization code from email_analyzer.py CONFIG
email_analyzer.py:17◉
Impact Attacker gains unauthorized access to [email protected] mailbox using harvested credentials
N/AFindings 4 items
| Severity | Finding | Location |
|---|---|---|
| High | Hardcoded Email Authorization Code Credential Theft | email_analyzer.py:17 |
| High | Credentials Exposed in Documentation Doc Mismatch | SKILL.md:18 |
| Medium | Email Content Access Without User Consent Flow Sensitive Access | view_email.py:1 |
| Low | Credentials Not Pinned in Dependencies Credential Theft | email_analyzer.py:6 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Network | READ | READ | ✓ Aligned | IMAPClient connects to imap.126.com for email access |
| Filesystem | WRITE | WRITE | ✓ Aligned | Writes JSON backup files and analysis reports |
| Shell | WRITE | WRITE | ✓ Aligned | Shell script wraps Python execution; all documented |
1 findings
Info Email 邮箱地址
[email protected] SKILL.md:12 File Tree
9 files · 33.0 KB · 1174 lines Python 7f · 856L
Markdown 1f · 211L
Shell 1f · 107L
├─
backup.py
Python
├─
delete_selective.py
Python
├─
delete.py
Python
├─
email_analyzer.py
Python
├─
email-analyzer.sh
Shell
├─
SKILL.md
Markdown
├─
verify.py
Python
├─
view_details.py
Python
└─
view_email.py
Python
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
imapclient | unpinned | pip import | No | No requirements.txt or version constraint found |
Security Positives
✓ No reverse shell or C2 infrastructure detected
✓ No data exfiltration to external IPs beyond legitimate IMAP connection
✓ All shell operations are documented and necessary for the stated purpose
✓ Deletion operations require explicit --confirm flag and manual 'yes' input
✓ Backup functionality preserves data before deletion
✓ No obfuscation techniques (base64, eval) detected
✓ IMAP connection is to legitimate 126.com server only