[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"extension-skill-claude-office-skills-suspicious-email-analyzer-it":3,"guides-for-claude-office-skills-suspicious-email-analyzer":220,"similar-k17b6y6ym8qwegt57vrymdj4cs867ewp":221},{"_creationTime":4,"_id":5,"children":6,"community":7,"display":9,"evaluation":20,"identity":186,"isFallback":191,"parentExtension":192,"providers":193,"relations":197,"repo":199,"workflow":217},1778053148350.4763,"k17b6y6ym8qwegt57vrymdj4cs867ewp",[],{"reviewCount":8},0,{"description":10,"installMethods":11,"name":12,"sourceUrl":13,"tags":14},"Analyze emails for phishing, scam indicators, and security threats",{},"Suspicious Email Analyzer","https://github.com/claude-office-skills/skills/tree/HEAD/suspicious-email",[15,16,17,18,19],"email","security","phishing","analysis","productivity",{"_creationTime":21,"_id":22,"extensionId":5,"locale":23,"result":24,"trustSignals":174,"workflow":184},1778053561145.7664,"kn721r70qyyg7es9dx8zcv1yg9867grq","en",{"checks":25,"evaluatedAt":164,"extensionSummary":165,"promptVersionExtension":166,"promptVersionScoring":167,"rationale":168,"score":169,"summary":170,"tags":171,"targetMarket":172,"tier":173},[26,31,34,37,41,44,48,53,56,59,63,67,70,74,77,80,83,86,89,92,96,100,104,108,112,115,118,121,126,129,132,135,138,141,145,148,151,154,157,161],{"category":27,"check":28,"severity":29,"summary":30},"Practical Utility","Problem relevance","pass","The description clearly states that the extension analyzes emails for phishing, scam indicators, and security threats, directly addressing a common user pain point.",{"category":27,"check":32,"severity":29,"summary":33},"Unique selling proposition","The skill provides a structured checklist and detailed analysis report for identifying various email threats, offering significant value beyond a generic email analysis prompt by guiding the LLM through specific threat indicators and providing actionable advice.",{"category":27,"check":35,"severity":29,"summary":36},"Production readiness","The skill is fully implemented with detailed instructions, analysis outputs, and common scam type categorizations, making it ready for use in a real workflow.",{"category":38,"check":39,"severity":29,"summary":40},"Scope","Single responsibility principle","The skill focuses solely on analyzing suspicious emails for security threats, demonstrating a single, well-defined responsibility.",{"category":38,"check":42,"severity":29,"summary":43},"Description quality","The displayed description accurately and concisely reflects the skill's functionality of analyzing emails for security threats.",{"category":45,"check":46,"severity":29,"summary":47},"Invocation","Scoped tools","The skill appears to operate as a single, focused analysis tool rather than exposing multiple narrow verb-noun actions, which is appropriate for its described function.",{"category":49,"check":50,"severity":51,"summary":52},"Documentation","Configuration & parameter reference","not_applicable","This skill does not appear to have configurable parameters or options that require documentation beyond the invocation examples.",{"category":38,"check":54,"severity":29,"summary":55},"Tool naming","The skill is named 'Suspicious Email Analyzer' and its capabilities are clearly described, adhering to domain-specific naming conventions.",{"category":38,"check":57,"severity":29,"summary":58},"Minimal I/O surface","The skill's input appears to be the email content and its output is a structured analysis report, suggesting a focused I/O surface.",{"category":60,"check":61,"severity":29,"summary":62},"License","License usability","The extension includes a MIT license file, which is a permissive open-source license.",{"category":64,"check":65,"severity":51,"summary":66},"Maintenance","Commit recency","No commit history is available for this extension.",{"category":64,"check":68,"severity":51,"summary":69},"Dependency Management","No third-party dependencies are explicitly listed or managed in the provided files.",{"category":71,"check":72,"severity":51,"summary":73},"Security","Secret Management","The skill does not appear to handle or use any secrets.",{"category":71,"check":75,"severity":29,"summary":76},"Injection","The skill focuses on analyzing provided text and does not appear to load or execute arbitrary third-party data as instructions.",{"category":71,"check":78,"severity":29,"summary":79},"Transitive Supply-Chain Grenades","The skill appears to be self-contained and does not fetch or execute external code or data at runtime.",{"category":71,"check":81,"severity":29,"summary":82},"Sandbox Isolation","The skill's function is analysis of provided text, not file manipulation, indicating no sandbox escape risks.",{"category":71,"check":84,"severity":29,"summary":85},"Sandbox escape primitives","There are no scripts or instructions that suggest detached-process spawns or retry loops around denied tool calls.",{"category":71,"check":87,"severity":29,"summary":88},"Data Exfiltration","The skill analyzes provided email content and does not make any outbound calls to submit confidential data or undocumented external resources.",{"category":71,"check":90,"severity":29,"summary":91},"Hidden Text Tricks","The bundled files do not contain any hidden-steering tricks such as HTML comments, white-on-white text, or invisible Unicode characters.",{"category":93,"check":94,"severity":29,"summary":95},"Hooks","Opaque code execution","The skill content is plain Markdown and does not involve obfuscated code, base64 payloads, or runtime script fetching.",{"category":97,"check":98,"severity":29,"summary":99},"Portability","Structural Assumption","The skill operates on provided text and does not make assumptions about the user's project file structure.",{"category":101,"check":102,"severity":51,"summary":103},"Trust","Issues Attention","No issue tracking data available for this extension.",{"category":105,"check":106,"severity":29,"summary":107},"Versioning","Release Management","The SKILL.md frontmatter declares a version '1.0', indicating clear versioning.",{"category":109,"check":110,"severity":51,"summary":111},"Code Execution","Validation","The skill's function is text analysis and does not involve executing code or handling structured inputs/outputs that would require validation schemas.",{"category":71,"check":113,"severity":51,"summary":114},"Unguarded Destructive Operations","The skill is purely analytical and does not perform any destructive operations.",{"category":109,"check":116,"severity":29,"summary":117},"Error Handling","The skill's nature as a text analysis tool means errors would typically manifest as inability to analyze or return a meaningful report, which is implicitly handled by the LLM's response generation.",{"category":109,"check":119,"severity":51,"summary":120},"Logging","The skill is purely analytical and does not perform actions or outbound calls that would necessitate local audit logging.",{"category":122,"check":123,"severity":124,"summary":125},"Compliance","GDPR","info","The skill analyzes email content which may include personal data. While it doesn't submit data to a 3rd party, it could submit personal data to the LLM.",{"category":122,"check":127,"severity":29,"summary":128},"Target market","The skill's language support (en, zh) and general phishing analysis are not regionally restricted, and the description is global in scope. `targetMarket` is 'global'.",{"category":97,"check":130,"severity":29,"summary":131},"Runtime stability","The skill operates on provided text content and does not have specific runtime or OS assumptions.",{"category":45,"check":133,"severity":29,"summary":134},"Precise Purpose","The skill's name, description, and 'How to Use' section clearly define its purpose: analyzing emails for specific security threats, providing concrete triggers and outlining necessary inputs.",{"category":45,"check":136,"severity":29,"summary":137},"Concise Frontmatter","The frontmatter is concise, clearly stating the skill's name, description, version, author, and license, facilitating precise routing.",{"category":49,"check":139,"severity":29,"summary":140},"Concise Body","The SKILL.md body is well-structured and under 500 lines, with detailed checklists and analysis outputs presented clearly without excessive bloat.",{"category":142,"check":143,"severity":29,"summary":144},"Context","Progressive Disclosure","Detailed checklists and analysis outputs are presented within the SKILL.md file, providing progressive disclosure without embedding large external materials.",{"category":142,"check":146,"severity":51,"summary":147},"Forked exploration","This skill is for direct analysis and does not involve heavy exploration or multi-file inspection that would require forked context.",{"category":27,"check":149,"severity":29,"summary":150},"Usage examples","Sufficient usage examples are provided in the 'How to Use' section, demonstrating clear inputs and expected outputs for analyzing emails.",{"category":27,"check":152,"severity":29,"summary":153},"Edge cases","The 'Limitations' section documents potential edge cases like inability to access headers, real-time reputation, and sophisticated phishing, along with the need for human judgment.",{"category":109,"check":155,"severity":51,"summary":156},"Tool Fallback","The skill does not rely on external tools like an MCP server and uses Claude's internal capabilities.",{"category":158,"check":159,"severity":29,"summary":160},"Safety","Halt on unexpected state","The skill's function is analytical. Any unexpected state would likely result in an inability to perform the analysis, implicitly halting the process for the user.",{"category":97,"check":162,"severity":29,"summary":163},"Cross-skill coupling","The skill is self-contained and focuses solely on email analysis, with no implicit reliance on other skills.",1778053484150,"This skill analyzes email content, including sender, subject, body, and links, against a detailed checklist of threat indicators to assess the likelihood of phishing or scams. It outputs a structured threat assessment report and provides recommended actions for suspicious emails.","2.0.0","3.4.0","The Suspicious Email Analyzer is a high-quality, well-documented skill that precisely addresses a common security concern. Its clear problem definition, comprehensive analysis, and practical examples make it ready for production use. The only minor point is the potential submission of personal data to the LLM, which is noted but doesn't detract from its overall strong verification.",95,"This skill effectively analyzes emails for phishing, scam indicators, and security threats, providing actionable insights and recommendations.",[15,16,17,18,19],"global","verified",{"codeQuality":175,"collectedAt":176,"documentation":177,"maintenance":179,"security":180,"testCoverage":183},{},1778053472892,{"descriptionLength":178,"readmeSize":8},66,{},{"hasNpmPackage":181,"license":182,"smitheryVerified":181},false,"MIT",{"hasCi":181,"hasTests":181},{"updatedAt":185},1778053561145,{"githubOwner":187,"githubRepo":188,"locale":23,"slug":189,"type":190},"claude-office-skills","skills","suspicious-email-analyzer","skill",true,null,{"extract":194,"llm":196},{"commitSha":195,"license":182},"9c4c7d5cd2813a8936bf2c9fdb174ea883b85a11",{"promptVersionExtension":166,"promptVersionScoring":167,"score":169,"targetMarket":172,"tier":173},{"repoId":198},"kd7fw7xbj58qc2z8whrrjptbed8659db",{"_creationTime":200,"_id":198,"identity":201,"providers":203,"workflow":214},1777995558409.8474,{"githubOwner":187,"githubRepo":188,"sourceUrl":202},"https://github.com/claude-office-skills/skills",{"discover":204,"github":207},{"sources":205},[206],"skills-sh",{"closedIssues90d":8,"forks":208,"license":182,"openIssues90d":209,"pushedAt":210,"readmeSize":211,"stars":212,"topics":213},27,2,1769868236000,29630,98,[],{"discoverAt":215,"extractAt":216,"githubAt":216,"updatedAt":216},1777995558409,1778053155657,{"anyEnrichmentAt":218,"extractAt":219,"githubAt":218,"llmAt":185,"updatedAt":185},1778053151766,1778053148350,[],[222,242,263,292,320,346],{"_creationTime":223,"_id":224,"community":225,"display":226,"identity":235,"providers":237,"relations":240,"workflow":241},1778053148350.4392,"k176nb59q75ts72wj0t06y0gj9866re0",{"reviewCount":8},{"description":227,"installMethods":228,"name":229,"sourceUrl":230,"tags":231},"Automatically categorize emails by type, priority, and required action",{},"Email Classifier","https://github.com/claude-office-skills/skills/tree/HEAD/email-classifier",[15,232,19,233,234],"classification","organization","automation",{"githubOwner":187,"githubRepo":188,"locale":23,"slug":236,"type":190},"email-classifier",{"extract":238,"llm":239},{"commitSha":195,"license":182},{"promptVersionExtension":166,"promptVersionScoring":167,"score":169,"targetMarket":172,"tier":173},{"repoId":198},{"anyEnrichmentAt":218,"extractAt":219,"githubAt":218,"llmAt":185,"updatedAt":185},{"_creationTime":243,"_id":244,"community":245,"display":246,"identity":255,"providers":257,"relations":261,"workflow":262},1778053148350.4397,"k1708dcmtssd488ych88ce2apx866cp1",{"reviewCount":8},{"description":247,"installMethods":248,"name":249,"sourceUrl":250,"tags":251},">",{},"Email Drafter","https://github.com/claude-office-skills/skills/tree/HEAD/email-drafter",[15,252,253,19,254],"writing","communication","mcp",{"githubOwner":187,"githubRepo":188,"locale":23,"slug":256,"type":190},"email-drafter",{"extract":258,"llm":259},{"commitSha":195,"license":182},{"promptVersionExtension":166,"promptVersionScoring":167,"score":169,"targetMarket":172,"tier":260},"flagged",{"repoId":198},{"anyEnrichmentAt":218,"extractAt":219,"githubAt":218,"llmAt":185,"updatedAt":185},{"_creationTime":264,"_id":265,"community":266,"display":267,"identity":277,"providers":281,"relations":286,"workflow":288},1778053327521.585,"k17eftejnaapgr7mnfajqgng2h866syh",{"reviewCount":8},{"description":268,"installMethods":269,"name":270,"sourceUrl":271,"tags":272},"Systematic fact verification and misinformation identification using evidence-based analysis. Use when: verifying claims, checking facts, identifying misinformation, evaluating source credibility, or when user asks to \"fact check\", \"verify\", \"is this true\", or mentions claims that need validation.",{},"Fact Checker","https://github.com/shubhamsaboo/awesome-llm-apps/tree/HEAD/awesome_agent_skills/fact-checker",[273,274,275,276,18],"fact-checking","misinformation","verification","llm-skill",{"githubOwner":278,"githubRepo":279,"locale":23,"slug":280,"type":190},"shubhamsaboo","awesome-llm-apps","fact-checker",{"extract":282,"llm":284},{"commitSha":283,"license":182},"a35897449fe8b0fab12e8f0fd9f2e2a40e872ab7",{"promptVersionExtension":166,"promptVersionScoring":167,"score":285,"targetMarket":172,"tier":173},100,{"repoId":287},"kd73kvct1kme7748mpsbddhhmx865wd3",{"anyEnrichmentAt":289,"extractAt":290,"githubAt":289,"llmAt":291,"updatedAt":291},1778053329769,1778053327521,1778053376632,{"_creationTime":293,"_id":294,"community":295,"display":296,"identity":305,"providers":309,"relations":314,"workflow":316},1778053622473.6594,"k171jc4epkmqq2y76n42e3eg0s866rf8",{"reviewCount":8},{"description":297,"installMethods":298,"name":299,"sourceUrl":300,"tags":301},"Systematically identify what's missing in non-fiction writing—both blind spots (inherent limitations) and blank spots (gaps that could be addressed). Use before finalizing non-fiction or when feedback feels incomplete.",{},"Blind Spot Detective","https://github.com/jwynia/agent-skills/tree/HEAD/skills/general/writing/analysis/blind-spot-detective",[252,18,302,303,304],"non-fiction","diagnostic","documentation",{"githubOwner":306,"githubRepo":307,"locale":23,"slug":308,"type":190},"jwynia","agent-skills","blind-spot-detective",{"extract":310,"llm":312},{"commitSha":311,"license":182},"e02ec7e226a6e4f8419fd3b88a1d8e472d421b32",{"promptVersionExtension":166,"promptVersionScoring":167,"score":313,"targetMarket":172,"tier":173},99,{"repoId":315},"kd7efn3mprpa8rd8vm5hw5ebzx864fph",{"anyEnrichmentAt":317,"extractAt":318,"githubAt":317,"llmAt":319,"updatedAt":319},1778053625386,1778053622473,1778054012696,{"_creationTime":321,"_id":322,"community":323,"display":324,"identity":332,"providers":336,"relations":340,"workflow":342},1778053100136.2446,"k17a4jnpny3pth7nf298fa1ced867vxf",{"reviewCount":8},{"description":325,"name":326,"sourceUrl":327,"tags":328},"Use this skill when the user requests to generate, create, write, or draft a newsletter, email digest, weekly roundup, industry briefing, or curated content summary. Supports topic-based research, content curation from multiple sources, and professional formatting for email or web distribution. Trigger on requests like \"create a newsletter about X\", \"write a weekly digest\", \"generate a tech roundup\", or \"curate news about Y\".","Newsletter Generation Skill","https://github.com/bytedance/deer-flow/tree/HEAD/skills/public/newsletter-generation",[329,330,252,331,15],"newsletter","content-generation","curation",{"githubOwner":333,"githubRepo":334,"locale":23,"slug":335,"type":190},"bytedance","deer-flow","newsletter-generation",{"extract":337,"llm":339},{"commitSha":338,"license":182},"1336872b15c25d45ebcb7c1cf72369c2bdd53187",{"promptVersionExtension":166,"promptVersionScoring":167,"score":212,"targetMarket":172,"tier":173},{"repoId":341},"kd789sm7egx1h0t1jag6zzhcq98656wv",{"anyEnrichmentAt":343,"extractAt":344,"githubAt":343,"llmAt":345,"updatedAt":345},1778053101076,1778053100136,1778053169012,{"_creationTime":347,"_id":348,"community":349,"display":350,"identity":362,"providers":365,"relations":370,"workflow":372},1778054070894.8628,"k17antgkdftwdz7cf6tkh5kq65867wht",{"reviewCount":8},{"description":351,"installMethods":352,"name":353,"sourceUrl":354,"tags":355},"Autonomous AI pentester for web apps and APIs. Run white-box security assessments with Shannon — analyzes source code, identifies attack vectors, and executes real exploits to prove vulnerabilities. Triggered by 'shannon', 'pentest', 'security audit', 'vuln scan'.",{},"Shannon Skill","https://github.com/unicodeveloper/shannon",[16,356,234,357,358,359,360,361],"pentesting","api","web","exploit","owasp","docker",{"githubOwner":363,"githubRepo":364,"locale":23,"slug":364,"type":190},"unicodeveloper","shannon",{"extract":366,"llm":369},{"commitSha":367,"license":368},"6a97124bee816c7cc76c6e17bb2b0fe8c0eae032","AGPL-3.0",{"promptVersionExtension":166,"promptVersionScoring":167,"score":212,"targetMarket":172,"tier":173},{"repoId":371},"kd7dk33pc652m4w5wrxaga9qn5865x26",{"anyEnrichmentAt":373,"extractAt":374,"githubAt":373,"llmAt":375,"updatedAt":375},1778054071281,1778054070894,1778054087802]