✓ Verified 🌐 Web Scrapers ✓ Enhanced Data

Shellmail

Email API for AI agents.

Rating
4.3 (32 reviews)
Downloads
12,668 downloads
Version
1.0.0

Overview

Email API for AI agents.

Complete Documentation

View Source →

ShellMail

Email for AI agents via shellmail.ai. Create inboxes, receive mail, extract OTPs automatically.

⚠️ Security & Privacy Notice

This skill requires a sensitive SHELLMAIL_TOKEN that grants full access to your inbox and OTPs.

When you set up this skill for the first time, you'll be instructed to save the token into agent configuration using gateway config.patch. This means:

  • The agent will retain persistent access to your ShellMail inbox
  • The token remains active until you explicitly revoke it or remove it from config
  • Only proceed if you fully trust shellmail.ai and understand these privacy implications
Best practices:
  • Use ShellMail for agent-related activities only, not personal email
  • Use disposable/separate recovery emails when possible
  • Review the gateway config.patch command output before confirming
  • Revoke access when you no longer need this skill

First-Time Setup

If no token is configured:

  • Ask user for desired email name (e.g., "atlas") and a recovery email
  • Or use auto for the name to generate a random address (e.g., "swift-reef-4821")
  • Run: {baseDir}/scripts/shellmail.sh create
  • If the address is already taken:
  • If the user says it was their old address: try creating with the same recovery email — deleted addresses are held for 14 days and can be reclaimed
  • Otherwise: suggest a different name or use auto
  • Do NOT suggest recovery unless the user confirms it's their previous inbox
  • Save the returned token:
text
gateway config.patch {"skills":{"entries":{"shellmail":{"env":{"SHELLMAIL_TOKEN":"sm_..."}}}}}

⚠️ Important: Before running this command, explain to the user:

  • This saves the token into agent configuration for persistent access
  • The agent will retain access to their inbox/OTPs until the token is removed or revoked
  • They should only proceed if they trust shellmail.ai and understand the privacy implications
  • Show them the exact command and ask for confirmation before executing
  • Tell user to save the token safely — it won't be shown again
  • Suggest user send a test email to their new address to verify it's working
  • Once they confirm, run inbox to show the test email arrived

Token Recovery

Only use recovery if the user explicitly says they lost access to an existing inbox they own:

bash
{baseDir}/scripts/shellmail.sh recover <[email protected]> <recovery_email>

This sends a new token to the recovery email on file. Do not suggest this for "address taken" errors.

Commands

bash
{baseDir}/scripts/shellmail.sh <command>

Check Inbox

bash
{baseDir}/scripts/shellmail.sh inbox
{baseDir}/scripts/shellmail.sh inbox --unread

Read Email

bash
{baseDir}/scripts/shellmail.sh read <email_id>

Get OTP Code

bash
# Get latest OTP
{baseDir}/scripts/shellmail.sh otp

# Wait up to 30 seconds for OTP
{baseDir}/scripts/shellmail.sh otp --wait 30

# Filter by sender
{baseDir}/scripts/shellmail.sh otp --wait 30 --from github.com

Search Emails

bash
{baseDir}/scripts/shellmail.sh search --query "verification"
{baseDir}/scripts/shellmail.sh search --otp
{baseDir}/scripts/shellmail.sh search --from stripe.com

Other Commands

bash
{baseDir}/scripts/shellmail.sh mark-read <id>
{baseDir}/scripts/shellmail.sh archive <id>
{baseDir}/scripts/shellmail.sh delete <id>
{baseDir}/scripts/shellmail.sh health

Common Patterns

User says "check my email":

bash
{baseDir}/scripts/shellmail.sh inbox --unread

User says "get the verification code":

bash
{baseDir}/scripts/shellmail.sh otp --wait 30

User says "wait for GitHub OTP":

bash
{baseDir}/scripts/shellmail.sh otp --wait 30 --from github.com

Revoking Access

If the user wants to revoke the skill's access to their ShellMail inbox:

Remove Token from Config

bash
gateway config.patch '{"skills":{"entries":{"shellmail":{"env":{"SHELLMAIL_TOKEN":""}}}}}'

Delete Account Entirely

bash
{baseDir}/scripts/shellmail.sh delete-account

Note: Deleted addresses enter a 14-day hold window and can only be reclaimed by the original owner using the recovery email.

API Reference

Base URL: https://shellmail.ai

All endpoints use Authorization: Bearer $SHELLMAIL_TOKEN

EndpointMethodDescription
/api/mailGETList emails (?unread=true&limit=50)
/api/mail/:idGETRead full email
/api/mail/:idPATCHUpdate {is_read, is_archived}
/api/mail/:idDELETEDelete email
/api/mail/otpGETGet OTP (?timeout=30000&from=domain)
/api/mail/searchGETSearch (?q=text&from=domain&has_otp=true)
/api/addressesPOSTCreate {local, recovery_email}

Installation

Terminal bash

openclaw install shellmail
    
Copied!

💻Code Examples

gateway config.patch {"skills":{"entries":{"shellmail":{"env":{"SHELLMAIL_TOKEN":"sm_..."}}}}}

gateway-configpatch-skillsentriesshellmailenvshellmailtokensm.txt
**⚠️ Important:** Before running this command, explain to the user:
   - This saves the token into agent configuration for persistent access
   - The agent will retain access to their inbox/OTPs until the token is removed or revoked
   - They should only proceed if they trust shellmail.ai and understand the privacy implications
   - Show them the exact command and ask for confirmation before executing

5. Tell user to save the token safely — it won't be shown again
6. Suggest user send a test email to their new address to verify it's working
7. Once they confirm, run `inbox` to show the test email arrived

## Token Recovery

Only use recovery if the user explicitly says they lost access to an existing inbox they own:

{baseDir}/scripts/shellmail.sh recover <[email protected]> <recovery_email>

basedirscriptsshellmailsh-recover-addressshellmailai-recoveryemail.txt
This sends a new token to the recovery email on file. Do not suggest this for "address taken" errors.

## Commands

{baseDir}/scripts/shellmail.sh health

basedirscriptsshellmailsh-health.txt
## Common Patterns

**User says "check my email":**

{baseDir}/scripts/shellmail.sh otp --wait 30 --from github.com

basedirscriptsshellmailsh-otp---wait-30---from-githubcom.txt
## Revoking Access

If the user wants to revoke the skill's access to their ShellMail inbox:

### Remove Token from Config
example.sh
# Get latest OTP
{baseDir}/scripts/shellmail.sh otp

# Wait up to 30 seconds for OTP
{baseDir}/scripts/shellmail.sh otp --wait 30

# Filter by sender
{baseDir}/scripts/shellmail.sh otp --wait 30 --from github.com
example.sh
{baseDir}/scripts/shellmail.sh search --query "verification"
{baseDir}/scripts/shellmail.sh search --otp
{baseDir}/scripts/shellmail.sh search --from stripe.com
example.sh
{baseDir}/scripts/shellmail.sh mark-read <id>
{baseDir}/scripts/shellmail.sh archive <id>
{baseDir}/scripts/shellmail.sh delete <id>
{baseDir}/scripts/shellmail.sh health

Tags

#browser_and-automation #api

Quick Info

Category Web Scrapers
Model Claude 3.5
Complexity Multi-Agent
Author aaronbatchelder
Last Updated 3/10/2026
🚀
Optimized for
Claude 3.5
🧠

Ready to Install?

Get started with this skill in seconds

openclaw install shellmail