Email Importance Content Analysis
Use a subject/title-first triage, then perform technical verification (headers/links/attachments) only when warranted, and only then validate with content analysis. Treat sender display name, badges, labels, and “From” appearance as untrusted.
Workflow (title → technical → content)
1) Title/subject + sender triage (cheap first-pass)
Use only:
subject line + sender (display name + email address/domain as shown). Do not click anything.
Important: treat sender as weak signal (can be spoofed). Use it for triage only.
1A) Fast-drop rules (save time)
If the sender looks
obviously sloppy/spoofed AND the email is not expected, classify as
Likely scam/ads and stop (do not spend time on technical verification).
Examples of fast-drop signals:
- - Display name claims a bank/government/major brand but the address is from a free mailbox (gmail/outlook/163/qq) or unrelated domain
- Lookalike domains / typo-squatting:
paypaI (I/l), micros0ft (0/O), extra -secure/-verify, weird punctuation - Suspicious TLDs or brand stuffed into subdomain: INLINECODE4
- Very unprofessional local-part patterns (random digits/strings) while claiming official identity
- Pure promo patterns (promo/marketing/news) + obvious sales subject ⇒ treat as ads
1B) Escalate rules (to technical verification)
Escalate for technical verification if
subject OR sender implies any of:
- - Money/settlement: 扣款/圈存/付款/退款/發票/帳單/對帳單/繳費
- Account/security: 登入/驗證/密碼重設/異常登入/停權/封鎖/安全警告
- Delivery/download: 文件下載/取件號碼/包裹/物流失敗
- Urgency/threat: 最後通知/24小時內/立即/否則將…
- Execution: 附件/請下載/請開啟/啟用巨集
If the subject is clearly marketing/newsletter and no action is implied ⇒ usually stop here (Low).
If it triggers the fast-drop rules, you may label it as:
- - Importance: Low
- Risk: Medium–High (spoof attempt)
- Next step: Do not click; optionally mark as spam/block
2) Technical verification (only for emails that passed title triage)
Prefer evaluating
raw email headers / “Show original” output (or via gog
gmail get). Check:
- - Authentication-Results: SPF / DKIM / DMARC results (
pass|fail|neutral) and note which domain they authenticate - Alignment: whether DKIM d= domain / SPF MAIL FROM / DMARC aligns with the visible From domain
- From vs Reply-To mismatch
- Links and attachments:
- Expand the real target domain (hover/copy link) — don’t trust anchor text
- Note risky attachments (e.g., .zip, .iso, .js, .vbs, .docm, password-protected archives)
If headers are not available, mark Technical verdict = Unknown and increase caution.
3) Extract the actionable claims (facts only) — only if technical verification passes
From the email body, list:
- - What happened / what they claim happened
- What they want the recipient to do (and by when)
- What account/system/money is involved
- What evidence they provide (order id, invoice id, ticket id, last-4 digits, timestamps)
4) Classify the required action (drives importance)
Rank higher if it requires any of:
- - Account access / authentication: login, password reset, 2FA codes, device approval
- Money movement: payment, wire, subscription renewal, invoice settlement, refunds
- Permissions / security posture: granting access, changing roles, API keys, OAuth consent
- Software execution: download/open an attachment, run a file, enable macros
- Data disclosure: personal/company info, documents, ID numbers
5) Content risk patterns (red flags)
Increase risk if the content shows:
- - Urgency / threat: “within 24h”, “account will be closed”, “legal action”, “final notice”
- Secrecy / bypass: “don’t tell others”, “use personal email”, “avoid normal process”
- Mismatch / vagueness: generic greeting, unclear context, missing specifics the real sender would know
- Odd requests: asking for OTP, gift cards, crypto, remote access, or direct bank changes
- Link/attachment pressure: “click to verify”, “download to view”, “enable macros”
6) Choose safe verification (do not trust the email path)
Even if SPF/DKIM/DMARC pass, for sensitive actions recommend
out-of-band verification:
- - Navigate via known official entry points (typed URL, app, bookmark), not email links
- If it claims an account issue: check account status by logging in from official site/app
- If it’s a vendor/payment issue: verify using the invoice/order id inside the official portal
- If it’s workplace related: verify via internal chat/phone using known contacts
7) Output: priority + next action
Always provide:
- - Title triage verdict: Escalate / Ignore
- Technical verdict: Pass / Fail / Unknown
- Importance level: Critical / High / Medium / Low
- Risk level: High (likely phishing) / Medium / Low
- Recommended next step: what to do now, what not to do, and how to verify
Decision Heuristics (quick)
- - Technical FAIL (SPF/DKIM/DMARC fail or obvious mismatch) + any call-to-action ⇒ Risk: High (treat as phishing) regardless of “importance”.
- Critical: money/credentials/permissions + urgency OR any request for OTP/macro/remote access.
- High: requires action soon, could cause loss of access/service interruption, but can be verified safely via official channels.
- Medium: informational but relevant; no immediate sensitive action.
- Low: newsletters, marketing, generic updates with no action.
Response Template (use in replies)
- - Title triage (why it escalates / why it can be ignored):
- Technical verification (SPF/DKIM/DMARC + alignment + From/Reply-To + link/attachment notes):
- Summary (1–2 lines):
- What it’s asking you to do:
- Why it may matter (impact if ignored):
- Red flags (if any):
- Safe verification path:
- Recommendation (do / don’t):
邮件重要性内容分析
采用主题/标题优先分类法,仅在必要时进行技术验证(邮件头/链接/附件),最后通过内容分析进行验证。将发件人显示名称、徽章、标签及“发件人”外观视为不可信。
工作流程(标题 → 技术 → 内容)
1) 标题/主题 + 发件人分类(低成本初筛)
仅使用:
主题行 + 发件人(显示名称 + 显示的邮箱地址/域名)。请勿点击任何内容。
重要提示:将发件人视为弱信号(可能被伪造),仅用于初步分类。
1A) 快速排除规则(节省时间)
若发件人明显
草率/伪造且邮件非预期内容,则归类为
疑似诈骗/广告并停止处理(无需进行技术验证)。
快速排除信号示例:
- - 显示名称声称来自银行/政府/大品牌,但邮箱地址来自免费邮箱(gmail/outlook/163/qq)或无关域名
- 相似域名/拼写错误域名:paypaI(I/l)、micros0ft(0/O)、额外添加-secure/-verify、奇怪标点符号
- 可疑顶级域名或品牌名称被塞入子域名:brand.security-check.example.com
- 声称官方身份但本地部分模式极不专业(随机数字/字符串)
- 纯促销模式(促销/营销/新闻)+ 明显销售主题 ⇒ 视为广告
1B) 升级规则(进入技术验证)
若
主题或发件人涉及以下任何内容,则升级至技术验证:
- - 金钱/结算:扣款/圈存/付款/退款/发票/账单/对账单/缴费
- 账户/安全:登录/验证/密码重置/异常登录/停权/封锁/安全警告
- 投递/下载:文件下载/取件号码/包裹/物流失败
- 紧迫/威胁:最后通知/24小时内/立即/否则将…
- 执行操作:附件/请下载/请开启/启用宏
若主题明显为营销/新闻通讯且无需操作 ⇒ 通常在此停止(低风险)。
若触发快速排除规则,可标记为:
- - 重要性:低
- 风险:中–高(伪造尝试)
- 下一步:请勿点击;可选择标记为垃圾邮件/屏蔽
2) 技术验证(仅针对通过标题分类的邮件)
优先评估
原始邮件头/“显示原始内容”输出(或通过gog gmail get获取)。检查:
- - 认证结果:SPF / DKIM / DMARC结果(通过/失败/中立),并注明认证的域名
- 对齐情况:DKIM d=域名/SPF MAIL FROM/DMARC是否与可见的发件人域名对齐
- 发件人与回复地址不匹配
- 链接和附件:
- 展开真实目标域名(悬停/复制链接)——不要信任锚文本
- 注意风险附件(如.zip、.iso、.js、.vbs、.docm、密码保护压缩包)
若无法获取邮件头,则标记技术判定 = 未知并提高警惕。
3) 提取可验证声明(仅事实)——仅在技术验证通过后进行
从邮件正文中列出:
- - 发生了什么/他们声称发生了什么
- 他们要求收件人做什么(以及截止时间)
- 涉及哪些账户/系统/资金
- 他们提供了哪些证据(订单号、发票号、工单号、末四位数字、时间戳)
4) 分类所需操作(决定重要性)
若涉及以下任何内容,则评级更高:
- - 账户访问/认证:登录、密码重置、双因素认证码、设备授权
- 资金转移:付款、电汇、订阅续费、发票结算、退款
- 权限/安全状态:授予访问权限、更改角色、API密钥、OAuth授权
- 软件执行:下载/打开附件、运行文件、启用宏
- 数据泄露:个人/公司信息、文件、身份证号码
5) 内容风险模式(危险信号)
若内容出现以下情况,则提高风险:
- - 紧迫/威胁:“24小时内”、“账户将被关闭”、“法律行动”、“最后通知”
- 保密/绕过:“不要告诉他人”、“使用个人邮箱”、“避免正常流程”
- 不匹配/模糊:通用问候语、上下文不清、缺少真实发件人应知的具体信息
- 异常请求:索要一次性密码、礼品卡、加密货币、远程访问或直接更改银行信息
- 链接/附件施压:“点击验证”、“下载查看”、“启用宏”
6) 选择安全验证方式(不要信任邮件路径)
即使SPF/DKIM/DMARC通过,对于敏感操作建议
带外验证:
- - 通过已知官方入口(手动输入网址、应用、书签)导航,而非邮件链接
- 若声称账户问题:通过官方网站/应用登录检查账户状态
- 若涉及供应商/付款问题:在官方门户内使用发票/订单号进行验证
- 若涉及工作相关:通过内部聊天/电话使用已知联系人进行验证
7) 输出:优先级 + 下一步操作
始终提供:
- - 标题分类判定:升级 / 忽略
- 技术判定:通过 / 失败 / 未知
- 重要性级别:关键 / 高 / 中 / 低
- 风险级别:高(疑似钓鱼)/ 中 / 低
- 建议下一步操作:现在应该做什么、不应做什么,以及如何验证
决策启发(快速参考)
- - 技术失败(SPF/DKIM/DMARC失败或明显不匹配)+ 任何行动号召 ⇒ 风险:高(视为钓鱼),无论“重要性”如何。
- 关键:涉及资金/凭证/权限 + 紧迫性 或 任何索要一次性密码/宏/远程访问的请求。
- 高:需要尽快操作,可能导致访问丢失/服务中断,但可通过官方渠道安全验证。
- 中:信息性但相关;无需立即执行敏感操作。
- 低:新闻通讯、营销、无需操作的通用更新。
回复模板(用于回复)
- - 标题分类(为何升级/为何可忽略):
- 技术验证(SPF/DKIM/DMARC + 对齐情况 + 发件人/回复地址 + 链接/附件说明):
- 摘要(1–2行):
- 要求您执行的操作:
- 为何重要(忽略的影响):
- 危险信号(如有):
- 安全验证路径:
- 建议(做 / 不做):