可信 — 风险评分 0/100
上次扫描:18 小时前 重新扫描
0 /100
tuta-mail
Send, read, and manage emails via Tuta (formerly Tutanota) encrypted email service
Legitimate Tuta encrypted email client with proper E2E cryptography, no credential exfiltration, and no malicious behavior.
技能名称tuta-mail
分析耗时35.0s
引擎pi
可以安装
This skill is safe to use. Ensure pip dependencies are version-pinned in production for reproducibility.
资源类型声明权限推断权限状态证据
文件系统 READ,WRITE WRITE ✓ 一致 SKILL.md:session-file / scripts/tuta_client.py:save_session (line 204)
网络访问 READ,WRITE READ,WRITE ✓ 一致 SKILL.md declares API usage at https://app.tuta.com/rest/
命令执行 NONE NONE No subprocess or shell execution; uses Python directly
环境变量 NONE NONE No direct environment variable access; credentials from openclaw.json
2 项发现
🔗
中危 外部 URL 外部 URL
https://app.tuta.com/rest/
SKILL.md:8
🔗
中危 外部 URL 外部 URL
https://app.tuta.com/rest
scripts/tuta_client.py:30

目录结构

2 文件 · 24.8 KB · 672 行
Python 1f · 588L Markdown 1f · 84L
├─ 📁 scripts
│ └─ 🐍 tuta_client.py Python 588L · 22.1 KB
└─ 📝 SKILL.md Markdown 84L · 2.6 KB

依赖分析 4 项

包名版本来源已知漏洞备注
requests * pip Version not pinned in SKILL.md documentation
pycryptodome * pip Version not pinned
bcrypt * pip Version not pinned
argon2-cffi * pip Version not pinned

安全亮点

✓ End-to-end encryption properly implemented with AES-128-CBC + HMAC-SHA256
✓ Session files stored with restrictive permissions (chmod 0o600)
✓ MAC verification prevents ciphertext tampering
✓ Argon2id supported for newer accounts with secure parameters (time_cost=4, memory_cost=32MB)
✓ Bcrypt cost factor (8 rounds) with SHA-256 pre-hashing for legacy accounts
✓ All network requests exclusively to legitimate Tuta API endpoint (app.tuta.com)
✓ Credentials used only for key derivation, never stored or exfiltrated
✓ No base64-encoded execution, reverse shells, or C2 communication
✓ No credential harvesting beyond legitimate login flow
✓ Proper PKCS7 padding removal with validation