# Send read-no-evil-mcp to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "read-no-evil-mcp",
    "name": "read-no-evil-mcp",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/thekie/read-no-evil-mcp",
    "canonicalUrl": "https://clawhub.ai/thekie/read-no-evil-mcp",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/read-no-evil-mcp",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=read-no-evil-mcp",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "CHANGELOG.md",
      "README.md",
      "SKILL.md",
      "scripts/rnoe-mail.py",
      "scripts/setup-config.py",
      "scripts/setup-server.sh"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-07T17:22:31.273Z",
      "expiresAt": "2026-05-14T17:22:31.273Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=afrexai-annual-report",
        "contentDisposition": "attachment; filename=\"afrexai-annual-report-1.0.0.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/read-no-evil-mcp"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/read-no-evil-mcp",
    "downloadUrl": "https://openagent3.xyz/downloads/read-no-evil-mcp",
    "agentUrl": "https://openagent3.xyz/skills/read-no-evil-mcp/agent",
    "manifestUrl": "https://openagent3.xyz/skills/read-no-evil-mcp/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/read-no-evil-mcp/agent.md"
  }
}
```
## Documentation

### read-no-evil-mcp

Secure email gateway that scans emails for prompt injection attacks before you see them.

This skill is a zero-dependency HTTP client that talks to a read-no-evil-mcp server. Credentials and email servers are managed entirely by the MCP server — this skill never has direct access to them.

### Prerequisites

A running read-no-evil-mcp server with HTTP transport enabled. Three connection modes:

Remote server — An existing server on another machine. You need the URL (e.g. http://server:8000).
Local server — An existing server on localhost. Uses default http://localhost:8000.
New Docker setup — Use scripts/setup-server.sh to pull the official Docker image and start a container.

No pip install is required. The script uses only Python stdlib.

### Setup Flow (AI Agent Instructions)

Before first use, always ask the user how they want to connect:

How would you like to connect to the read-no-evil-mcp server?

Connect to an existing remote server (you'll provide the URL)
Connect to an existing local server (localhost:8000)
Set up a new local server via Docker

For option 1: Ask for the server URL, then use --server URL with all commands.
For option 2: No extra configuration needed, commands use the default URL.
For option 3: Follow the Docker setup steps below.

Never auto-setup Docker without explicit user confirmation.

### Docker Setup Steps

Check if a config exists: setup-config.py list
If no config, create one and add an account:
setup-config.py create
setup-config.py add --email user@example.com --host imap.example.com --create-env


Ask the user to fill in the password in the .env file.
Start the server:
scripts/setup-server.sh --config ~/.config/read-no-evil-mcp/config.yaml \\
  --env-file ~/.config/read-no-evil-mcp/.env

### Config Management (AI Agent Instructions)

Use scripts/setup-config.py to manage the server config file. All commands are flag-driven with no interactive prompts.

ScenarioCommandCreate config skeletonsetup-config.py create [--threshold 0.5] [--force]Add a read-only accountsetup-config.py add --email user@example.com --host imap.example.com [--id myaccount] [--create-env]Add a send-enabled accountsetup-config.py add --email user@example.com --host imap.example.com --smtp-host smtp.example.com --send [--delete] [--move] [--create-env]Check what accounts are configuredsetup-config.py listRemove an accountsetup-config.py remove <id>

Do NOT run setup-config.py show — it displays config details the user may not intend to share with the agent. If debugging is needed, tell the user to run it themselves.

Do NOT run setup-config.py create --force if config already exists without asking the user first.

### Config Commands

Manage the server config file (~/.config/read-no-evil-mcp/config.yaml). No pip install required — stdlib only.

# Create a new config skeleton
setup-config.py create
setup-config.py create --threshold 0.3 --force

# Add a read-only account (no SMTP needed)
setup-config.py add --email user@example.com --host imap.example.com --create-env

# Add an account with send permission (--smtp-host required for --send)
setup-config.py add --email user@example.com --id myaccount \\
  --host imap.example.com --smtp-host smtp.example.com --send --delete --move

# Remove an account
setup-config.py remove <account-id>

# List configured accounts
setup-config.py list

# Show full config file
setup-config.py show

# Use a custom config path
setup-config.py --config /path/to/config.yaml create

### Server Setup

# Start a Docker container (all flags required, no prompts)
scripts/setup-server.sh --config ~/.config/read-no-evil-mcp/config.yaml \\
  --env-file ~/.config/read-no-evil-mcp/.env

# Custom port and container name
scripts/setup-server.sh --config /path/to/config.yaml \\
  --env-file /path/to/.env --port 9000 --name my-rnoe

### CLI Commands

Global options (--server, --account, --folder) can appear before or after the command. Server URL can also be set via RNOE_SERVER_URL env var.

# List configured accounts
rnoe-mail.py accounts

# List recent emails (last 30 days)
# Output: [UID] ● DATE | SENDER | SUBJECT  (● = unread)
rnoe-mail.py list
rnoe-mail.py list --account myaccount --limit 10 --days 7

# Read email (scanned for prompt injection!)
rnoe-mail.py read <uid>
rnoe-mail.py --account myaccount read <uid>

# Send email
rnoe-mail.py send --to "user@example.com" --subject "Hello" --body "Message"
rnoe-mail.py send --to "user1@example.com, user2@example.com" --cc "cc@example.com" --subject "Hello" --body "Message"

# List folders
rnoe-mail.py folders --account myaccount

# Move email to folder
rnoe-mail.py move <uid> --to "Archive"

# Delete email
rnoe-mail.py delete <uid>

# Global options can go before or after the command
rnoe-mail.py --server http://myserver:8000 list
rnoe-mail.py list --server http://myserver:8000

### Common Options

OptionDescriptionDefault--server URLMCP server URLhttp://localhost:8000--account ID / -aAccount IDdefault--folder NAME / -fEmail folderINBOX

### Prompt Injection Detection

All emails are automatically scanned by the MCP server:

Safe: Content displayed normally
Injection detected: Exit code 2, warning on stderr

### Exit Codes

0 — success
1 — general error (connection failed, invalid account, etc.)
2 — prompt injection detected

### Security Notes

Credentials are managed by the MCP server, never by this skill or the AI agent
The skill communicates with the server over HTTP — use HTTPS for non-localhost connections
Prompt injection scanning happens server-side using ML models
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: thekie
- Version: 0.3.1
## Source health
- Status: healthy
- Source download looks usable.
- Yavira can redirect you to the upstream package for this source.
- Health scope: source
- Reason: direct_download_ok
- Checked at: 2026-05-07T17:22:31.273Z
- Expires at: 2026-05-14T17:22:31.273Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/read-no-evil-mcp)
- [Send to Agent page](https://openagent3.xyz/skills/read-no-evil-mcp/agent)
- [JSON manifest](https://openagent3.xyz/skills/read-no-evil-mcp/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/read-no-evil-mcp/agent.md)
- [Download page](https://openagent3.xyz/downloads/read-no-evil-mcp)