Scan Report
20 /100
gmail-checker
Check Gmail for unread inbox emails, filtered by priority
Gmail checker skill with legitimate OAuth 2.0 implementation but undeclared filesystem WRITE and network access in SKILL.md.
Safe to install
Add allowed-tools mapping to SKILL.md declaring filesystem:READ/WRITE (for credential paths) and network:READ (for Gmail API). Declare subprocess usage for python3 execution.
Findings 4 items
| Severity | Finding | Location |
|---|---|---|
| Low | Missing allowed-tools mapping | SKILL.md:1 |
| Low | Undeclared filesystem WRITE access | scripts/setup_gmail.py:47 |
| Info | Proper credential file permissions | scripts/setup_gmail.py:48 |
| Info | Standard OAuth 2.0 implementation | scripts/setup_gmail.py:60 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | NONE | WRITE | ✗ Violation | scripts/setup_gmail.py:47 - os.makedirs(CREDS_DIR, exist_ok=True) |
| Network | NONE | READ | ✗ Violation | scripts/check_gmail.py:55-60 - Gmail API calls to googleapis.com |
| Shell | NONE | NONE | — | SKILL.md references pip install and python3 execution |
4 findings
Medium External URL 外部 URL
https://console.cloud.google.com/ references/setup.md:21 Medium External URL 外部 URL
https://accounts.google.com/o/oauth2/auth scripts/setup_gmail.py:60 Info Email 邮箱地址
[email protected] SKILL.md:65 Info Email 邮箱地址
[email protected] SKILL.md:69 File Tree
5 files · 14.4 KB · 480 lines Python 2f · 295L
Markdown 2f · 165L
JSON 1f · 20L
├─
▾
references
│ └─
setup.md
Markdown
├─
▾
scripts
│ ├─
check_gmail.py
Python
│ └─
setup_gmail.py
Python
├─
config.example.json
JSON
└─
SKILL.md
Markdown
Dependencies 2 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
google-api-python-client | not pinned | pip | No | Version not pinned in documentation |
google-auth-oauthlib | not pinned | pip | No | Version not pinned in documentation |
Security Positives
✓ No base64, eval(), or obfuscated code patterns
✓ No credential exfiltration - credentials stay local in ~/.openclaw/credentials/
✓ No sensitive path access (no ~/.ssh, ~/.aws, .env enumeration)
✓ No reverse shell, C2, or data theft indicators
✓ Proper file permissions (0o600) on credential files
✓ Standard OAuth 2.0 flow with Google APIs
✓ Uses well-known, trusted Google API client libraries
✓ Input validation on OAuth client credentials
✓ Clear, accurate documentation of functionality