Scan Report
15 /100
lmail_ops_complete
Operate LMail end-to-end with strict registration, authentication, inbox loops, threaded replies, and admin registration audits
This is a legitimate LMail email operations skill with proper credential handling, standard library-only dependencies, and no malicious behavior. Minor concerns include undocumented credential file writes and a hardcoded example URL.
Safe to install
This skill is safe to use. Ensure the LMAIL_BASE_URL is trusted before deployment. Consider pinning the base URL in production deployments.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Undeclared credential file writes Doc Mismatch | scripts/strict_register.py:158 |
| Info | External service URL reference Sensitive Access | SKILL.md:56 |
| Info | No dependency pinning Supply Chain | N/A |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✓ Aligned | Writes credentials.json and state files - necessary for the feature |
| Network | READ | READ | ✓ Aligned | All network calls to configured LMAIL_BASE_URL |
| Shell | NONE | WRITE | ✓ Aligned | Shell scripts for deployment - documented in SKILL.md |
3 findings
Medium External URL 外部 URL
https://amiigzz.online SKILL.md:56 Info Email 邮箱地址
[email protected] SKILL.md:115 Info Email 邮箱地址
[email protected] assets/payload-templates/send-message.json:2 File Tree
31 files · 70.8 KB · 2387 lines Python 11f · 1467L
Shell 8f · 511L
Markdown 8f · 382L
JSON 3f · 23L
YAML 1f · 4L
├─
▾
agents
│ └─
openai.yaml
YAML
├─
▾
assets
│ ├─
▾
curl-snippets
│ │ └─
challenge-solve-register.sh
Shell
│ └─
▾
payload-templates
│ ├─
override-permit.json
JSON
│ ├─
register.json
JSON
│ └─
send-message.json
JSON
├─
▾
references
│ ├─
api-contract.md
Markdown
│ ├─
docs-source-of-truth.md
Markdown
│ ├─
error-codes-runbook.md
Markdown
│ ├─
openclaw-publish-checklist.md
Markdown
│ ├─
ops-playbook.md
Markdown
│ ├─
security-policy.md
Markdown
│ └─
strict-registration-v2.md
Markdown
├─
▾
scripts
│ ├─
admin_fetch_registration_events.py
Python
│ ├─
admin_issue_override_permit.py
Python
│ ├─
chat_fast.py
Python
│ ├─
inbox_loop.py
Python
│ ├─
inbox_once.py
Python
│ ├─
install_for_openclaw.sh
Shell
│ ├─
lmail_http.py
Python
│ ├─
login_verify.py
Python
│ ├─
preflight_check.sh
Shell
│ ├─
print_claude_setup.sh
Shell
│ ├─
publish_clawhub.sh
Shell
│ ├─
send_message.py
Python
│ ├─
send_reply.py
Python
│ ├─
smoke_test_registration_flow.sh
Shell
│ ├─
solve_pow.py
Python
│ ├─
strict_register.py
Python
│ ├─
sync_docs_check.sh
Shell
│ └─
validate_openclaw_skill.sh
Shell
└─
SKILL.md
Markdown
Dependencies 1 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
python3-standard-library | N/A | built-in | No | No external dependencies - uses only stdlib |
Security Positives
✓ Standard library only - no malicious dependencies possible
✓ Credentials are masked when printed (mask_secret function)
✓ Credentials files set to mode 0600
✓ No subprocess/eval/exec usage
✓ No base64 execution into shell - base64 only used for legitimate JWT parsing
✓ No access to ~/.ssh, ~/.aws, .env, or other sensitive paths
✓ No curl|bash or wget|sh remote script execution
✓ All network requests go to configured base URL, no hardcoded IPs
✓ Well-structured code with proper error handling
✓ Security policy document present in references/