email-imap-append
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]:
- The skill executes a Python script (
scripts/imap_append.py) to interface with IMAP servers via command-line arguments. - It uses standard libraries to handle message construction and server communication.
- [DATA_EXFILTRATION]:
- The
--attachparameter in theappend-draftcommand enables the agent to read any file on the local filesystem accessible to the process. - Attachment content is read via
path.read_bytes()and uploaded to the configured IMAP server, creating a potential path for exfiltrating sensitive local information if the agent is manipulated. - [CREDENTIALS_UNSAFE]:
- The skill relies on the
IMAP_PASSWORDenvironment variable for authentication. - Storing sensitive credentials in environment variables makes them accessible to other processes in the same environment.
- [PROMPT_INJECTION]:
- The skill has an indirect prompt injection surface (Category 8).
- Ingestion points: Local files read via
--attachand text provided via--bodyor--subject. - Boundary markers: None. There are no instructions to the agent to treat data from files or arguments as untrusted content.
- Capability inventory: The script
scripts/imap_append.pyprovides combined filesystem read and network write capabilities. - Sanitization: None. The skill does not validate or filter the content of attachments or messages for embedded instructions.
Audit Metadata