google-calendar
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONNO_CODE
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection.
- Ingestion points: Tools such as
list_eventsandget_eventretrieve event summaries and descriptions which can be authored by external parties (e.g., meeting organizers). - Boundary markers: There are no delimiters or instructions provided to the agent to treat the ingested calendar data as untrusted or to ignore embedded commands.
- Capability inventory: The skill provides write and delete capabilities via
create_event,update_event,delete_event, andquick_add_event, which could be triggered by malicious instructions embedded in a calendar invite. - Sanitization: There is no evidence of input sanitization or validation of the retrieved event content before it is processed by the agent.
- [DATA_EXFILTRATION]: The skill provides access to potentially sensitive information.
- Tools can retrieve attendee email addresses, meeting locations, and private notes, which could be exposed if the agent's context is manipulated by an attacker.
- [NO_CODE]: The skill consists solely of tool definitions in markdown.
- It lacks the underlying implementation code (e.g., Python or JavaScript scripts) and dependency manifests required to actually perform the described operations.
Audit Metadata