bd-email
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill utilizes a non-trusted external package
@gongrzhe/server-gmail-autoauth-mcpvianpxfor Gmail integration. - DATA_EXFILTRATION (MEDIUM): The skill accesses sensitive local files including a contact database at
/Users/forni/Craft/vocation/network/contacts.mdand explicitly points to Gmail OAuth credential paths such as~/.gmail-mcp/credentials.json. - COMMAND_EXECUTION (MEDIUM): Troubleshooting instructions involve executing shell commands like
npx,cat, andlson sensitive configuration directories. - INDIRECT_PROMPT_INJECTION (LOW): The skill's core workflow involves reading untrusted data from Gmail (
read_email,search_emails) without specified boundary markers or sanitization. This surface allows malicious emails to potentially influence the agent's behavior during the drafting process. - Ingestion points:
read_emailandsearch_emailstools. - Boundary markers: None identified in instructions.
- Capability inventory:
send_email,draft_email, and local file system access. - Sanitization: None identified.
Audit Metadata