add-gmail

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: CRITICAL
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt asks the user to paste their GCP OAuth JSON (or a file path) and provides commands that embed that JSON verbatim (here-doc EOF or cp with the provided path), which requires the LLM to handle and output secret values directly, creating an exfiltration risk.

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 0.90). This integration guide requires pasting/placing OAuth credentials and mounting them into a container, grants an agent full read/send Gmail access, instructs the user to run remote npx packages and to bypass "unverified app" warnings — collectively creating strong opportunities for data exfiltration and supply-chain/RCE abuse.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill ingests and processes arbitrary incoming Gmail messages (via the Gmail MCP @gongrzhe/server-gmail-autoauth-mcp) — see checkForNewEmails()/startEmailLoop() and runEmailAgent() which build prompts from email body/subject — so it consumes untrusted, user-generated third‑party content as part of its workflow.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 16, 2026, 03:32 AM