paw-mail-usage
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Provides instructions to install the
paw-mailCLI from the author's repository (github.com/pawpair/paw-mail-cli). - [COMMAND_EXECUTION]: Requests permissions to execute
paw-mailandpaw-mail-tuibinaries as defined inSKILL.md. It also includes commands for manual installation using system package managers, such assudo dpkg. - [PROMPT_INJECTION]: Enables the agent to read email content, which serves as a surface for indirect prompt injection from external messages.
- Ingestion points:
paw-mail emails body,paw-mail emails list, andpaw-mail emails fetchcommands inSKILL.md. - Boundary markers: None specified in the documentation.
- Capability inventory: Execution of the
paw-mailCLI and usage ofRead,Glob, andGreptools as specified inSKILL.md. - Sanitization: No explicit sanitization or filtering of email content is described.
Audit Metadata