# Send ShellMail - Email Built for AI Agents to your agent
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
## Fast path
- Download the package from Yavira.
- Extract it into a folder your agent can access.
- Paste one of the prompts below and point your agent at the extracted folder.
## Suggested prompts
### New install

```text
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Tell me what you changed and call out any manual steps you could not complete.
```
### Upgrade existing

```text
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Summarize what changed and any follow-up checks I should run.
```
## Machine-readable fields
```json
{
  "schemaVersion": "1.0",
  "item": {
    "slug": "shellmail",
    "name": "ShellMail - Email Built for AI Agents",
    "source": "tencent",
    "type": "skill",
    "category": "开发工具",
    "sourceUrl": "https://clawhub.ai/aaronbatchelder/shellmail",
    "canonicalUrl": "https://clawhub.ai/aaronbatchelder/shellmail",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadUrl": "/downloads/shellmail",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=shellmail",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "packageFormat": "ZIP package",
    "primaryDoc": "SKILL.md",
    "includedAssets": [
      "SKILL.md",
      "skill.json",
      "scripts/shellmail.sh"
    ],
    "downloadMode": "redirect",
    "sourceHealth": {
      "source": "tencent",
      "slug": "shellmail",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-05-08T19:12:27.366Z",
      "expiresAt": "2026-05-15T19:12:27.366Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=shellmail",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=shellmail",
        "contentDisposition": "attachment; filename=\"shellmail-1.0.12.zip\"",
        "redirectLocation": null,
        "bodySnippet": null,
        "slug": "shellmail"
      },
      "scope": "item",
      "summary": "Item download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this item.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/shellmail"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    }
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/shellmail",
    "downloadUrl": "https://openagent3.xyz/downloads/shellmail",
    "agentUrl": "https://openagent3.xyz/skills/shellmail/agent",
    "manifestUrl": "https://openagent3.xyz/skills/shellmail/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/shellmail/agent.md"
  }
}
```
## Documentation

### ShellMail

Email for AI agents via shellmail.ai. Create inboxes, receive mail, extract OTPs automatically.

### ⚠️ Security & Privacy Notice

This skill requires a sensitive SHELLMAIL_TOKEN that grants full access to your inbox and OTPs.

When you set up this skill for the first time, you'll be instructed to save the token into agent configuration using gateway config.patch. This means:

The agent will retain persistent access to your ShellMail inbox
The token remains active until you explicitly revoke it or remove it from config
Only proceed if you fully trust shellmail.ai and understand these privacy implications

Best practices:

Use ShellMail for agent-related activities only, not personal email
Use disposable/separate recovery emails when possible
Review the gateway config.patch command output before confirming
Revoke access when you no longer need this skill

### First-Time Setup

If no token is configured:

Ask user for desired email name (e.g., "atlas") and a recovery email

Or use auto for the name to generate a random address (e.g., "swift-reef-4821")


Run: {baseDir}/scripts/shellmail.sh create <name> <recovery_email>
If the address is already taken:

If the user says it was their old address: try creating with the same recovery email — deleted addresses are held for 14 days and can be reclaimed
Otherwise: suggest a different name or use auto
Do NOT suggest recovery unless the user confirms it's their previous inbox


Save the returned token:

gateway config.patch {"skills":{"entries":{"shellmail":{"env":{"SHELLMAIL_TOKEN":"sm_..."}}}}}

⚠️ Important: Before running this command, explain to the user:

This saves the token into agent configuration for persistent access
The agent will retain access to their inbox/OTPs until the token is removed or revoked
They should only proceed if they trust shellmail.ai and understand the privacy implications
Show them the exact command and ask for confirmation before executing

Tell user to save the token safely — it won't be shown again
Suggest user send a test email to their new address to verify it's working
Once they confirm, run inbox to show the test email arrived

### Token Recovery

Only use recovery if the user explicitly says they lost access to an existing inbox they own:

{baseDir}/scripts/shellmail.sh recover <address@shellmail.ai> <recovery_email>

This sends a new token to the recovery email on file. Do not suggest this for "address taken" errors.

### Commands

{baseDir}/scripts/shellmail.sh <command>

### Check Inbox

{baseDir}/scripts/shellmail.sh inbox
{baseDir}/scripts/shellmail.sh inbox --unread

### Read Email

{baseDir}/scripts/shellmail.sh read <email_id>

### Get OTP Code

# Get latest OTP
{baseDir}/scripts/shellmail.sh otp

# Wait up to 30 seconds for OTP
{baseDir}/scripts/shellmail.sh otp --wait 30

# Filter by sender
{baseDir}/scripts/shellmail.sh otp --wait 30 --from github.com

### Search Emails

{baseDir}/scripts/shellmail.sh search --query "verification"
{baseDir}/scripts/shellmail.sh search --otp
{baseDir}/scripts/shellmail.sh search --from stripe.com

### Other Commands

{baseDir}/scripts/shellmail.sh mark-read <id>
{baseDir}/scripts/shellmail.sh archive <id>
{baseDir}/scripts/shellmail.sh delete <id>
{baseDir}/scripts/shellmail.sh health

### Common Patterns

User says "check my email":

{baseDir}/scripts/shellmail.sh inbox --unread

User says "get the verification code":

{baseDir}/scripts/shellmail.sh otp --wait 30

User says "wait for GitHub OTP":

{baseDir}/scripts/shellmail.sh otp --wait 30 --from github.com

### Revoking Access

If the user wants to revoke the skill's access to their ShellMail inbox:

### Remove Token from Config

gateway config.patch '{"skills":{"entries":{"shellmail":{"env":{"SHELLMAIL_TOKEN":""}}}}}'

### Delete Account Entirely

{baseDir}/scripts/shellmail.sh delete-account

Note: Deleted addresses enter a 14-day hold window and can only be reclaimed by the original owner using the recovery email.

### API Reference

Base URL: https://shellmail.ai

All endpoints use Authorization: Bearer $SHELLMAIL_TOKEN

EndpointMethodDescription/api/mailGETList emails (?unread=true&limit=50)/api/mail/:idGETRead full email/api/mail/:idPATCHUpdate {is_read, is_archived}/api/mail/:idDELETEDelete email/api/mail/otpGETGet OTP (?timeout=30000&from=domain)/api/mail/searchGETSearch (?q=text&from=domain&has_otp=true)/api/addressesPOSTCreate {local, recovery_email}
## Trust
- Source: tencent
- Verification: Indexed source record
- Publisher: aaronbatchelder
- Version: 1.0.12
## Source health
- Status: healthy
- Item download looks usable.
- Yavira can redirect you to the upstream package for this item.
- Health scope: item
- Reason: direct_download_ok
- Checked at: 2026-05-08T19:12:27.366Z
- Expires at: 2026-05-15T19:12:27.366Z
- Recommended action: Download for OpenClaw
## Links
- [Detail page](https://openagent3.xyz/skills/shellmail)
- [Send to Agent page](https://openagent3.xyz/skills/shellmail/agent)
- [JSON manifest](https://openagent3.xyz/skills/shellmail/agent.json)
- [Markdown brief](https://openagent3.xyz/skills/shellmail/agent.md)
- [Download page](https://openagent3.xyz/downloads/shellmail)