跳至主要内容
小龙虾小龙虾AI
🤖

Email Importance Content Analysis

Judge whether an email is important/urgent using content-based analysis rather than sender name or mailbox labels (which can be spoofed). Use when asked to triage emails, decide priority, detect phishing/social-engineering, or recommend next actions (reply/pay/login/download/click) based on what the message asks the user to do.

下载648
星标0
版本1.0.1
效率工具
安全通过
💬Prompt

技能说明


name: email-importance-content-analysis description: Judge whether an email is important/urgent using content-based analysis rather than sender name or mailbox labels (which can be spoofed). Use when asked to triage emails, decide priority, detect phishing/social-engineering, or recommend next actions (reply/pay/login/download/click) based on what the message asks the user to do.

Email Importance Content Analysis

Use a subject/title-first triage, then perform technical verification (headers/links/attachments) only when warranted, and only then validate with content analysis. Treat sender display name, badges, labels, and “From” appearance as untrusted.

Workflow (title → technical → content)

1) Title/subject + sender triage (cheap first-pass)

Use only: subject line + sender (display name + email address/domain as shown). Do not click anything.

Important: treat sender as weak signal (can be spoofed). Use it for triage only.

1A) Fast-drop rules (save time)

If the sender looks obviously sloppy/spoofed AND the email is not expected, classify as Likely scam/ads and stop (do not spend time on technical verification). Examples of fast-drop signals:

  • Display name claims a bank/government/major brand but the address is from a free mailbox (gmail/outlook/163/qq) or unrelated domain
  • Lookalike domains / typo-squatting: paypaI (I/l), micros0ft (0/O), extra -secure/-verify, weird punctuation
  • Suspicious TLDs or brand stuffed into subdomain: brand.security-check.example.com
  • Very unprofessional local-part patterns (random digits/strings) while claiming official identity
  • Pure promo patterns (promo/marketing/news) + obvious sales subject ⇒ treat as ads

1B) Escalate rules (to technical verification)

Escalate for technical verification if subject OR sender implies any of:

  • Money/settlement: 扣款/圈存/付款/退款/發票/帳單/對帳單/繳費
  • Account/security: 登入/驗證/密碼重設/異常登入/停權/封鎖/安全警告
  • Delivery/download: 文件下載/取件號碼/包裹/物流失敗
  • Urgency/threat: 最後通知/24小時內/立即/否則將…
  • Execution: 附件/請下載/請開啟/啟用巨集

If the subject is clearly marketing/newsletter and no action is implied ⇒ usually stop here (Low).

If it triggers the fast-drop rules, you may label it as:

  • Importance: Low
  • Risk: Medium–High (spoof attempt)
  • Next step: Do not click; optionally mark as spam/block

2) Technical verification (only for emails that passed title triage)

Prefer evaluating raw email headers / “Show original” output (or via gog gmail get). Check:

  • Authentication-Results: SPF / DKIM / DMARC results (pass|fail|neutral) and note which domain they authenticate
  • Alignment: whether DKIM d= domain / SPF MAIL FROM / DMARC aligns with the visible From domain
  • From vs Reply-To mismatch
  • Links and attachments:
    • Expand the real target domain (hover/copy link) — don’t trust anchor text
    • Note risky attachments (e.g., .zip, .iso, .js, .vbs, .docm, password-protected archives)

If headers are not available, mark Technical verdict = Unknown and increase caution.

3) Extract the actionable claims (facts only) — only if technical verification passes

From the email body, list:

  • What happened / what they claim happened
  • What they want the recipient to do (and by when)
  • What account/system/money is involved
  • What evidence they provide (order id, invoice id, ticket id, last-4 digits, timestamps)

4) Classify the required action (drives importance)

Rank higher if it requires any of:

  • Account access / authentication: login, password reset, 2FA codes, device approval
  • Money movement: payment, wire, subscription renewal, invoice settlement, refunds
  • Permissions / security posture: granting access, changing roles, API keys, OAuth consent
  • Software execution: download/open an attachment, run a file, enable macros
  • Data disclosure: personal/company info, documents, ID numbers

5) Content risk patterns (red flags)

Increase risk if the content shows:

  • Urgency / threat: “within 24h”, “account will be closed”, “legal action”, “final notice”
  • Secrecy / bypass: “don’t tell others”, “use personal email”, “avoid normal process”
  • Mismatch / vagueness: generic greeting, unclear context, missing specifics the real sender would know
  • Odd requests: asking for OTP, gift cards, crypto, remote access, or direct bank changes
  • Link/attachment pressure: “click to verify”, “download to view”, “enable macros”

6) Choose safe verification (do not trust the email path)

Even if SPF/DKIM/DMARC pass, for sensitive actions recommend out-of-band verification:

  • Navigate via known official entry points (typed URL, app, bookmark), not email links
  • If it claims an account issue: check account status by logging in from official site/app
  • If it’s a vendor/payment issue: verify using the invoice/order id inside the official portal
  • If it’s workplace related: verify via internal chat/phone using known contacts

7) Output: priority + next action

Always provide:

  • Title triage verdict: Escalate / Ignore
  • Technical verdict: Pass / Fail / Unknown
  • Importance level: Critical / High / Medium / Low
  • Risk level: High (likely phishing) / Medium / Low
  • Recommended next step: what to do now, what not to do, and how to verify

Decision Heuristics (quick)

  • Technical FAIL (SPF/DKIM/DMARC fail or obvious mismatch) + any call-to-action ⇒ Risk: High (treat as phishing) regardless of “importance”.
  • Critical: money/credentials/permissions + urgency OR any request for OTP/macro/remote access.
  • High: requires action soon, could cause loss of access/service interruption, but can be verified safely via official channels.
  • Medium: informational but relevant; no immediate sensitive action.
  • Low: newsletters, marketing, generic updates with no action.

Response Template (use in replies)

  • Title triage (why it escalates / why it can be ignored):
  • Technical verification (SPF/DKIM/DMARC + alignment + From/Reply-To + link/attachment notes):
  • Summary (1–2 lines):
  • What it’s asking you to do:
  • Why it may matter (impact if ignored):
  • Red flags (if any):
  • Safe verification path:
  • Recommendation (do / don’t):

如何使用「Email Importance Content Analysis」?

  1. 打开小龙虾AI(Web 或 iOS App)
  2. 点击上方「立即使用」按钮,或在对话框中输入任务描述
  3. 小龙虾AI 会自动匹配并调用「Email Importance Content Analysis」技能完成任务
  4. 结果即时呈现,支持继续对话优化

相关技能