clawemail

clawhub:clawemail

View source
A
100/100

First Seen

Feb 18, 2026

Last Scanned

Feb 22, 2026

Findings

12

Score

100/100

LOW 12

Findings (12)

LOW
Runtime URL controlling behavior
L16

Detects URLs fetched at runtime that control or influence agent behavior without pinning

Get credentials at https:// + config
FIX

Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.

FP?

Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.

LOW
Shell script file execution
L22

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L34

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L74

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Base64 encode and send
L78

Detects base64 encoding of content followed by transmission

b64encode + curl
FIX

Block patterns that base64-encode data and immediately transmit it. If base64 encoding is needed, ensure the encoded data does not contain secrets and destinations are allowlisted.

FP?

Likely FP if base64 encoding is used for legitimate purposes like encoding images for display or constructing data URIs, with no network transmission.

LOW
Shell script file execution
L131

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L213

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L279

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L332

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Non-localhost remote MCP server URL
L374

Detects MCP server configurations connecting to non-localhost remote URLs

"url":"https://example.com/image.png"
FIX

Change the MCP server URL to localhost or a trusted internal endpoint. If a remote server is required, verify the domain ownership and use HTTPS with certificate validation.

FP?

Likely FP if the URL points to example.com, a documentation domain, or a well-known SaaS API endpoint (e.g., api.openai.com).

LOW
Shell script file execution
L384

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L441

Detects execution of shell script files via bash/sh command or direct invocation

bash
TOKEN=$(~/.openclaw/skills/clawemail/scripts/token.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.