suspicious email analyzer

Suspicious Email Analyzer

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "suspicious email analyzer" with this command: npx skills add claude-office-skills/skills/claude-office-skills-skills-suspicious-email-analyzer

Suspicious Email Analyzer

Analyze emails for phishing attempts, scams, and security threats to protect against fraud.

Overview

This skill helps you:

  • Identify phishing attempts

  • Detect scam patterns

  • Analyze suspicious links

  • Assess email authenticity

  • Recommend safe actions

How to Use

Analyze an Email

"Is this email legitimate?" "Check this email for phishing" "Analyze this suspicious message"

Provide Email Content

Include:

  • Sender email address

  • Subject line

  • Full email body

  • Any links (don't click them!)

Threat Indicators

Red Flags Checklist

Email Security Assessment

Sender Analysis

  • Domain mismatch: Display name doesn't match email domain
  • Lookalike domain: microsoft.corn, amaz0n.com
  • Free email for business: Official company using gmail.com
  • Random characters: x7y2z@suspicious.com
  • No reply-to: Cannot respond to sender

Content Analysis

  • Urgency pressure: "Act NOW", "Account suspended"
  • Threat language: "Legal action", "Account closure"
  • Too good to be true: Prize winner, inheritance
  • Generic greeting: "Dear Customer" vs your name
  • Grammar/spelling errors: Unusual mistakes
  • Requests sensitive info: Password, SSN, credit card
  • Unexpected attachment: Especially .exe, .zip, .docm

Link Analysis

  • Hover reveals different URL: Display vs actual link
  • Shortened URLs: bit.ly, tinyurl hiding destination
  • HTTP (not HTTPS): Insecure for sensitive pages
  • Misspelled domains: paypa1.com, netlfix.com
  • IP address URLs: http://192.168.1.1/login
  • Excessive subdomains: secure.login.verify.site.com

Technical Indicators

  • Missing security headers: SPF, DKIM, DMARC fail
  • Unusual sending time: 3 AM from "local bank"
  • Bulk email markers: Mass mail headers present

Analysis Output

Threat Assessment Report

Email Security Analysis

Summary

AttributeValue
Threat Level🔴 HIGH / 🟠 MEDIUM / 🟡 LOW / 🟢 SAFE
Confidence[X]%
VerdictLikely Phishing / Suspicious / Legitimate

Sender Analysis

Email Address

Issues Found

  1. ❌ Domain "paypa1-verify.com" is not official PayPal
  2. ❌ Uses number "1" instead of letter "l"
  3. ❌ Domain registered 3 days ago

Content Analysis

Subject: "Urgent: Your Account Has Been Limited"

  • 🔴 Uses urgency tactic
  • 🔴 Threatening language

Body Issues

IssueExampleSeverity
Generic greeting"Dear Customer"🟡 Medium
Urgency"within 24 hours"🔴 High
Threat"account suspended"🔴 High
Grammar"Please to verify"🟠 Medium

Requests Made

  • ❌ Asks to click link
  • ❌ Requests login credentials
  • ❌ Asks for personal information

Link Analysis

Link Found

URL Issues

  1. ❌ Domain is not paypal.com
  2. ❌ Uses HTTP (insecure)
  3. ❌ Suspicious path mimics login

Conclusion

Verdict: 🔴 PHISHING ATTEMPT

This email shows multiple indicators of a phishing attack:

  1. Fake sender domain mimicking PayPal
  2. Urgency and threat tactics
  3. Link to fraudulent website
  4. Request for login credentials

Recommended Actions

  1. ✅ Do NOT click any links
  2. ✅ Do NOT reply to this email
  3. ✅ Report to phishing@paypal.com
  4. ✅ Delete the email
  5. ✅ If clicked link, change password immediately

Common Scam Types

Phishing Categories

Phishing Attack Types

1. Credential Phishing

Goal: Steal login credentials Pretends to be: Banks, email providers, social media Tactics: Fake login pages, urgent account issues Example: "Your account password expires today"

2. CEO/Business Email Compromise

Goal: Wire transfer fraud Pretends to be: Executive, vendor, partner Tactics: Urgency, authority, secrecy Example: "Please wire $50K for urgent deal, keep confidential"

3. Technical Support Scam

Goal: Remote access or payment Pretends to be: Microsoft, Apple, ISP Tactics: Fake virus alerts, account compromise Example: "We detected virus on your computer, call now"

4. Invoice/Payment Scam

Goal: Payment to fraudulent account Pretends to be: Vendor, client, internal Tactics: Fake invoices, changed bank details Example: "Updated bank account for invoice payment"

5. Package Delivery Scam

Goal: Credentials or malware Pretends to be: FedEx, UPS, USPS, DHL Tactics: Failed delivery, tracking issues Example: "Package could not be delivered, click to reschedule"

6. Tax/Government Scam

Goal: Personal info or payment Pretends to be: IRS, SSA, government agency Tactics: Legal threats, refund promises Example: "IRS Notice: Immediate action required"

Legitimate vs Phishing Comparison

How to Spot the Difference

Banking Email Example

AspectLegitimatePhishing
Fromalerts@chase.comchase-alert@gmail.com
Greeting"Hi John Smith""Dear Customer"
Urgency"Review when convenient""IMMEDIATE ACTION REQUIRED"
LinksLinks to chase.comLinks to chase-verify.com
Action"Log in to your account""Enter password here"
ToneProfessional, calmThreatening, urgent
PersonalizationAccount ending 4532No specifics

Action Guidelines

What To Do

Response Protocol

If Email is SUSPICIOUS (🔴🟠)

  1. ❌ Do NOT click links
  2. ❌ Do NOT download attachments
  3. ❌ Do NOT reply
  4. ❌ Do NOT call numbers in email
  5. ✅ Verify through official channels
    • Go to official website directly (type URL)
    • Call known customer service number
  6. ✅ Report the email
    • Forward to IT security
    • Report to company being impersonated
  7. ✅ Delete the email

If You Already Clicked

  1. ✅ Disconnect from internet (if malware suspected)
  2. ✅ Change passwords immediately
  3. ✅ Enable 2-factor authentication
  4. ✅ Monitor accounts for suspicious activity
  5. ✅ Run antivirus scan
  6. ✅ Report to IT department
  7. ✅ Consider credit monitoring if financial info shared

Reporting Channels

Email Header Analysis

What to Check

Email Header Deep Dive

Key Headers to Review

HeaderWhat It Shows
FromDisplayed sender
Return-PathActual reply address
ReceivedServer path (bottom = origin)
SPFSender authorized?
DKIMSignature valid?
DMARCPolicy result

Authentication Results

ResultMeaning
passLegitimate
failLikely spoofed
softfailPossibly spoofed
noneNo policy set

Limitations

  • Cannot access actual email headers without them being provided

  • Cannot verify real-time domain reputation

  • Cannot click or analyze live links

  • Some sophisticated phishing may pass analysis

  • Legitimate emails may have some warning signs

  • Human judgment is essential for final decision

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

General

ppt-visual

No summary provided by upstream source.

Repository SourceNeeds Review
General

office-mcp

No summary provided by upstream source.

Repository SourceNeeds Review
General

docx-manipulation

No summary provided by upstream source.

Repository SourceNeeds Review
General

tiktok-marketing

No summary provided by upstream source.

Repository SourceNeeds Review