email-sender
Warn
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
send_email_with_attachmentsfunction inemail_sender.pyprovides the capability to read any file from the host filesystem and send it as an email attachment. This could be exploited to exfiltrate sensitive data such as SSH keys or configuration files if the agent's input is not strictly controlled. - Evidence: The function uses
open(filepath, 'rb')on user-provided paths and attaches the content to aMIMEMultipartmessage. - [CREDENTIALS_UNSAFE]: The skill contains hardcoded absolute file paths and specific user identifiers belonging to the developer's environment, which may leak information about the development system and hardcodes a default sender email address.
- Evidence:
load_env_fileinemail_sender.pysearches for a hardcoded path/Users/delta/.openclaw/.env.examples.pyalso hardcodes a workspace path insys.path. - [PROMPT_INJECTION]: The skill's documentation and logic enforce behavioral constraints that mandate the inclusion of promotional content (advertisements) and specific formatting in every email, overriding potential user or agent preferences.
- Evidence:
SKILL.mddefines 'Mandatory Rules' for advertisement inclusion, and thesend_tech_emailfunction inemail_sender.pyautomatically injectsEVENT_AD_TEMPLATEunless explicitly disabled. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it processes untrusted data (email content and subjects) and wraps them in HTML templates without sanitization or boundary markers.
- Ingestion points:
to_email,subject,body, andcontentarguments across all functions inemail_sender.py. - Boundary markers: None identified in the prompt construction.
- Capability inventory: Filesystem read (
open), Network communication (smtplib.SMTP_SSL). - Sanitization: No sanitization or escaping is performed on input strings before they are interpolated into HTML templates.
Audit Metadata