morning-email-rollup
Audited by Socket on Feb 21, 2026
1 alert found:
Obfuscated File[Skill Scanner] Skill instructions include directives to hide actions from user The script implements stated functionality and appears to be a legitimate utility for summarizing calendar events and Gmail messages. The main security risk is deliberate transmission of sensitive email bodies to external services (Gemini/AI provider and Telegram/Clawdbot) and the additional exposure from embedding content in command-line arguments. There is no direct evidence of malware, backdoors, or obfuscation in the provided fragment; however the privacy/exfiltration risk is significant for sensitive email content and should be mitigated by design changes (minimize text sent externally, avoid command-line argument embedding, verify CLI provenance, and document endpoints). LLM verification: Functionally coherent with its stated purpose, but presents notable privacy and supply-chain risks: it reads full email bodies and calendar events, sends them to an external AI (Gemini) as prompts, and delivers results through a messaging system (Clawdbot/Telegram) whose trust boundary is not documented. The use of automated, 'isolated' cron sessions increases the chance that sensitive data is moved without close user oversight. There is no clear malicious code, obfuscation, or direct credential