ToolTrust
B15/100
Smithery

agentmail

mcpsmithery

@Smithery

AgentMail MCP server for programmatic inbox management and email automation.

By Smithery | 5 findings | Scanned 3/22/2026 | tooltrust-scanner/v0.1.15

2 High3 Medium

Security Findings (5)

  • HighInsecure Secret Handling ×2
    • list_inboxes:input parameter "pageToken" appears to accept a secret or credential
    • list_threads:input parameter "pageToken" appears to accept a secret or credential
    Rule: AS-010Fix: Avoid accepting raw credentials as input parameters. Use secret managers (e.g. 1Password CLI, AWS Secrets Manager) and ensure credentials are never logged or stored in agent traces.
  • MediumExcessive Permission Surface ×3
    • create_inbox:tool declares fs permission
    • delete_inbox:tool declares fs permission
    • update_message:tool declares fs permission
    Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories.

Scan this tool yourself

Reproduce this audit locally or block risky tools in CI.

Install once, then scan any MCP server:

$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash
$ tooltrust-scanner scan --server "npx -y agentmail"

Adjust the package name if your npm registry name differs from the tool ID. View source

Add badge to your README

Copy this Markdown to show your ToolTrust grade on GitHub.

[![ToolTrust Grade B](https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-directory/main/docs/badges/grade-b.svg)](https://github.com/AgentSafe-AI/tooltrust-directory)