Skip to content
← Registry
Trust Report

mailgun

22
REJECTED
Format: openclawScanner: v0.7.1Duration: 25msScanned: 9h ago · Apr 8, 7:49 PMSource →
Embed this badge
AgentVerus REJECTED 22AgentVerus REJECTED 22AgentVerus REJECTED 22
[![AgentVerus](https://agentverus.ai/api/v1/skill/783cafcc-9171-4075-bad0-df039ba52a2d/badge)](https://agentverus.ai/skill/783cafcc-9171-4075-bad0-df039ba52a2d)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/783cafcc-9171-4075-bad0-df039ba52a2d/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"783cafcc-9171-4075-bad0-df039ba52a2d","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/783cafcc-9171-4075-bad0-df039ba52a2d/trust

Category Scores

68
Permissions
75
Injection
0
Dependencies
75
Behavioral
70
Content
80
Code Safety

Findings (11)

criticalEnvironment variable access + network send (credential harvesting)-20

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them.

'Authorization': `Bearer ${process.env.MATON_API_KEY}`,

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
highCapability contract mismatch: inferred file read is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: reference/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://clawhub.ai/byungkyu/api-gateway

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
highCapability contract mismatch: inferred documentation ingestion is not declared-10

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: reference/

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
highComprehensive secret collection detected-25

Found comprehensive secret collection pattern: "List Credentials"

#### List Credentials

Skills should not instruct collection of all tokens, keys, or credentials. Access only the specific credentials needed and declare them.

injectionASST-05
highLocal file access detected-15

Found local file access pattern: "reference/"

- [Mailgun API Documentation](https://documentation.mailgun.com/docs/mailgun/api-reference/api-overview)

Treat local file browsing as privileged access. Restrict it to explicit user-approved paths and avoid combining it with unrestricted browser/session reuse.

behavioralASST-03
mediumCredential-bearing URL parameter-8

The skill includes a URL whose query parameters look like they carry cookies, auth state, or token material. URLs are commonly logged and replayed, so credential-bearing parameters expand the dependency risk surface even on first-party domains. Related auth/profile context: - overlapping signals from the same local context — Unknown external reference

https://connect.maton.ai/?session_token=

Avoid query-string credential transport. Prefer secure headers, dedicated cookie APIs, or other mechanisms that do not expose bearer material in URLs.

dependenciesASST-04
mediumFederated auth flow detected-10

Found federated auth flow pattern: "OAuth" Related auth/profile context: - auth/session capability-contract context — Capability contract mismatch: inferred cookie URL handoff is not declared

Mailgun API integration with managed OAuth. Transactional email service for sending, receiving, and tracking emails.

Treat OAuth, 2FA, and token-refresh guidance as authentication-sensitive workflows. Explain scope, storage, and refresh behavior clearly so agents do not handle more credential material than necessary.

behavioralASST-05
lowMissing or insufficient description-5

The skill lacks a meaningful description, making it difficult to assess its purpose.

No description found

Add a clear, detailed description of what the skill does and what it needs access to.

contentASST-09
lowNo explicit safety boundaries-10

The skill does not include explicit safety boundaries defining what it should NOT do.

No safety boundary patterns found

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
infoError handling instructions present

The skill includes error handling instructions for graceful failure.

Error handling patterns detected

Keep these error handling instructions.

contentASST-09