calendly-automation
Warn
Audited by Snyk on Feb 20, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's required workflows call Calendly toolkit endpoints (e.g., CALENDLY_LIST_EVENTS, CALENDLY_LIST_EVENT_INVITEES, CALENDLY_GET_EVENT) to fetch and interpret event and invitee data from users' Calendly accounts (third-party, user-generated content) and then use that data to decide and perform actions like cancellations or invitations, which could allow indirect instruction injection.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill requires connecting to the MCP endpoint https://rube.app/mcp and explicitly instructs calling RUBE_SEARCH_TOOLS to fetch current tool schemas at runtime, so content fetched from that URL can directly control agent prompts/tool behavior.
Audit Metadata