apple-mail

Fail

Audited by Socket on Mar 1, 2026

1 alert found:

Obfuscated File
Obfuscated FileHIGH
SKILL.md

The tool's described behavior aligns with its stated purpose: reading Apple Mail indexes and .emlx files and extracting attachments. There is no direct evidence here of malicious code (no network callbacks, hard-coded credentials, or backdoors). However, the tool accesses highly sensitive personal data and writes attachments to /tmp, which raises a significant privacy/exfiltration risk when used by untrusted agents or in environments with networked or automated components. Recommend using this tool only in trusted contexts, ensuring the caller performs secure handling (access controls on stdout/stderr, cleanup of /tmp artifacts), and reviewing the actual script for safe argument handling (quoting/escaping) and possible injection risks before deployment.

Confidence: 98%
Audit Metadata
Analyzed At
Mar 1, 2026, 11:19 AM
Package URL
pkg:socket/skills-sh/mitsuhiko%2Fagent-commands%2Fapple-mail%2F@c4ae5f4645eb43863269b27b67080f471b42fd0f