miot-calendar
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
miotCLI to perform operations, passing parameters such as calendar and resource IDs to shell commands. This is the intended primary functionality.\n- [EXTERNAL_DOWNLOADS]: The skill instructs the agent to usenpx @microboxlabs/miot-cli, which downloads and runs the vendor's own package from the npm registry at execution time. This is a legitimate vendor resource.\n- [PROMPT_INJECTION]: The skill processes data from the ModularIoT API (via CLI JSON output), which represents an indirect prompt injection surface.\n - Ingestion points: CLI response data in
SKILL.md(e.g., list results, slot details).\n - Boundary markers: Absent; the instructions do not tell the agent to distinguish between its own logic and the data provided by the API.\n
- Capability inventory: The skill can execute commands to create, modify, and delete calendars and bookings.\n
- Sanitization: No data validation or sanitization is specified for the API output before it is summarized for the user.
Audit Metadata