google-calendar
Pass
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to executecurlcommands for interacting with the Google Calendar API. It also usesjqfor JSON processing anddatefor time calculations. - [EXTERNAL_DOWNLOADS]: The skill instructions include installing the
@googleworkspace/clipackage from the npm registry. This package is maintained by thegoogleworkspaceorganization, which is a well-known and trusted source. Use of this tool is optional and limited to agenda and event creation tasks. - [DATA_EXPOSURE]: The skill processes calendar data including event summaries, descriptions, locations, and attendee emails. This is inherent to the skill's purpose. It explicitly instructs the agent to treat the OAuth bearer token as a secret and avoid logging it.
- [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection as it ingests untrusted data from calendar event fields (summary, description). However, it uses
jqfor parsing and provides clear instructions for user confirmation before performing write operations, which mitigates the risk. - Ingestion points: Event data is fetched from the Google Calendar API via
curlinSKILL.md. - Boundary markers: None explicitly defined for event content interpolation.
- Capability inventory: The skill has
Bashtool access for network requests and file operations. - Sanitization: Uses
jqfor structured data extraction and requires human-in-the-loop confirmation for updates or deletions.
Audit Metadata