gmail

Warn

Audited by Socket on Feb 16, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/core/cache_manager.py

This module implements a local filesystem cache for Gmail-related data and contains no clear signs of intentional malware (no network exfiltration, no code injection, no hardcoded secrets). However, it has security issues: it fails to validate or sanitize 'account' and 'message_id' inputs and allows absolute paths or traversal segments when constructing file system paths. This can lead to accidental or malicious deletion or modification of files outside the intended cache directory (via unlink or shutil.rmtree) and other filesystem-level attacks (symlink/TOCTOU). Recommend sanitizing inputs (reject path separators and absolute paths, canonicalize and verify paths remain under cache_dir), use atomic writes (write-to-temp + rename), handle I/O exceptions explicitly, and consider file permissions and protections. Use caution if running in an environment where 'account' or message identifiers may be attacker-controlled or when GMAIL_CACHE_DIR can be set by untrusted actors.

Confidence: 90%Severity: 70%
Audit Metadata
Analyzed At
Feb 16, 2026, 08:46 PM
Package URL
pkg:socket/skills-sh/team-attention%2Fplugins-for-claude-natives%2Fgmail%2F@c406bd7e964237bafe425131c27302ca2aaf4bbc