imap-smtp-email
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The skill uses a
.envfile to store sensitive email credentials (IMAP/SMTP passwords). This is a standard and recommended practice for managing secrets in a development environment. Thesetup.shscript specifically sets file permissions to 600 to ensure only the owner can read or write the configuration. - [PROMPT_INJECTION]: The skill processes untrusted data from external email content, which creates a surface for indirect prompt injection.
- Ingestion points: Email bodies and headers are fetched by
scripts/imap.jsand provided to the agent. - Boundary markers: The skill does not explicitly use delimiters to wrap the fetched email content when presenting it to the agent.
- Capability inventory: The skill has the ability to read files (
scripts/smtp.js), write files (scripts/imap.js), and send network requests via SMTP (scripts/smtp.js). - Sanitization: Malicious instructions in emails are mitigated by strict path validation. The functions
validateReadPathandvalidateWritePathenforce a whitelist of directories (ALLOWED_READ_DIRSandALLOWED_WRITE_DIRS), preventing the agent from being tricked into reading or writing sensitive system files. - [COMMAND_EXECUTION]: The skill executes local Node.js scripts (
scripts/imap.jsandscripts/smtp.js) to perform email operations. These scripts use standard, well-vetted libraries and do not accept arbitrary shell commands or untrusted input for command execution.
Audit Metadata