calendly-automation

Warn

Audited by Snyk on Feb 20, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's required workflows call Calendly toolkit endpoints (e.g., CALENDLY_LIST_EVENTS, CALENDLY_LIST_EVENT_INVITEES, CALENDLY_GET_EVENT) to fetch and interpret event and invitee data from users' Calendly accounts (third-party, user-generated content) and then use that data to decide and perform actions like cancellations or invitations, which could allow indirect instruction injection.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill requires connecting to the MCP endpoint https://rube.app/mcp and explicitly instructs calling RUBE_SEARCH_TOOLS to fetch current tool schemas at runtime, so content fetched from that URL can directly control agent prompts/tool behavior.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 20, 2026, 08:18 AM