ekctl
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill processes untrusted data from calendar events and reminders which can contain malicious instructions. * Ingestion points: The
ekctl list eventsandekctl list reminderscommands inSKILL.mdingest external text into the agent context. * Boundary markers: Absent. The instructions do not define delimiters or warn the agent to ignore instructions within the event data. * Capability inventory: The skill provides high-impact write capabilities includingekctl delete event,ekctl delete reminder, andekctl complete reminder. * Sanitization: Absent. There is no validation of the content retrieved from the calendar before it is processed by the agent. - [Unverifiable Dependencies] (MEDIUM): The skill requires the installation of
ekctlfrom a third-party GitHub repository (schappim/ekctl) that is not in the trusted source list. This binary-level dependency has not been verified for security. - [Command Execution] (LOW): The skill executes multiple shell commands to interact with the macOS EventKit framework. While the operations are consistent with the stated purpose, the agent is granted significant control over personal organizational data.
Recommendations
- AI detected serious security threats
Audit Metadata