Is coenenp/gmail-label-manager safe?

https://github.com/openclaw/skills/tree/main/skills/coenenp/gmail-label-manager

47
DANGEROUS

The Gmail Label Manager skill contains two severe security vulnerabilities: (1) it systematically forwards email content — including security alerts, password resets, financial transactions, medical records, and children's school communications — to an external Telegram API endpoint, functioning as a built-in email surveillance relay that is completely undisclosed in SKILL.md; and (2) it executes eval on shell commands built from unsanitized email-derived data, creating a command injection vector that allows any sender to execute arbitrary code on the host. While installation behavior was clean and canary files remained intact, the skill's runtime behavior represents a significant and ongoing privacy and security threat to any user who installs it.

Category Scores

Prompt Injection 80/100 · 30%
Data Exfiltration 5/100 · 25%
Code Execution 20/100 · 20%
Clone Behavior 85/100 · 10%
Canary Integrity 90/100 · 10%
Behavioral Reasoning 10/100 · 5%

Findings (11)

CRITICAL Email content forwarded to external Telegram API -60

The script's send_telegram() function uses curl to POST email body previews, sender information, subjects, and classified content to https://api.telegram.org. This occurs for every processed email across all handler functions (financial, medical, school, family, security). The TELEGRAM_BOT_TOKEN and TELEGRAM_CHAT_ID are configurable, but the SKILL.md never discloses this behavior. Any user who installs this skill or is given a pre-configured bot token controlled by an attacker will have their inbox content continuously exfiltrated.

CRITICAL Command injection via eval() with email-derived variables -50

add_calendar_event() constructs a shell command string by interpolating email-derived variables (event title from subject line, date from email body) directly into a string that is then passed to eval. An attacker can send a crafted email whose subject or body contains shell metacharacters to execute arbitrary commands on the host system with the agent's user privileges.

CRITICAL Security alerts and password reset emails forwarded to Telegram -40

The skill explicitly classifies security_alert, password_reset, and login_notification email patterns at HIGH/CRITICAL priority and forwards their content to Telegram. This means password reset links, 2FA codes embedded in emails, new-login alerts, and suspicious activity notifications are all exfiltrated in real-time to an external messaging service — enabling trivial account takeover by any party who can observe the Telegram chat.

HIGH Financial transaction data exfiltrated to Telegram -30

Card transaction details (card last four digits, merchant, amount), bank transfer recipients and account numbers, payment receipts, and invoices are all extracted from email content and forwarded to Telegram with HIGH priority. This creates a real-time financial surveillance channel.

HIGH Medical and health data forwarded to external service -25

Lab results, surgery schedules, hospital bills, prescriptions, and insurance pre-approvals are classified as CRITICAL and forwarded to Telegram. Medical data is among the most sensitive personal information and should never be routed through third-party messaging services.

HIGH Skill architecture functions as email surveillance relay -40

The combined functionality — reading emails, classifying them, extracting sensitive fields, and forwarding to an external service — constitutes an email surveillance relay regardless of user intent. If Telegram credentials are attacker-provided, user-supplied but later compromised, or the Telegram channel is monitored, a complete picture of the user's financial, medical, family, and security communications is available to the attacker in real-time.

HIGH Children's school communications forwarded to external service -20

School attendance records, discipline notifications, grade reports, and parent-teacher conference details — including child names — are forwarded to Telegram at CRITICAL priority. This exposes sensitive minor-related data to an external third-party service.

HIGH Undisclosed capabilities create deceptive skill description -20

SKILL.md markets the skill as a Gmail label organizer but omits any mention of Telegram notifications, external API calls, or email content forwarding. A user reading the skill description has no basis to consent to their email data being transmitted to external services. This omission could be considered a social engineering vector targeting user trust.

MEDIUM Uninitialized variable in extract_amount() may corrupt curl command arguments -10

extract_amount() references $amount before it is declared or assigned. The first grep -oP block checks 'if [ -z "$amount" ]' but $amount has not been initialized with a local declaration, meaning it inherits from the calling scope or is empty. This can cause garbled Telegram messages or, in edge cases, inject unexpected values into curl data arguments.

MEDIUM Demographic-specific patterns suggest targeted deployment -15

script.sh contains hardcoded references to specific institutions (BNH Hospital, Samitivej, Coupang WOW, DOSZ health insurance, RSZ/ONSS social security, ManageBac school portal) and family demographics suggesting it was built for a specific individual's inbox. Distributing this via a marketplace to unrelated users means the patterns will not match, but the Telegram exfiltration and eval injection still execute.

LOW Installation source verified — openclaw/skills monorepo 0

The skill was cloned exclusively from the legitimate openclaw/skills.git GitHub repository (140.82.112.3). No additional repositories, package managers, or external URLs were fetched during installation. Sparse checkout was used correctly.