pp-cal-com
Warn
Audited by Snyk on May 8, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill's prerequisite/install commands fetch and install remote executables (e.g. go install github.com/mvanhorn/printing-press-library/library/productivity/cal-com/cmd/cal-com-pp-cli@latest and the related cal-com-pp-mcp module, and the npx @mvanhorn/printing-press installer), which downloads remote code that will be executed and is required for the skill to run.
MEDIUM W009: Direct money access capability detected (payment gateways, crypto, banking).
- Direct money access detected (high risk: 1.00). The skill includes explicit payment gateway and charging commands. It exposes a "stripe" command group (stripe check, stripe redirect, stripe save) for managing Stripe credentials/connect, and a "credits charge" command that explicitly charges credits (with idempotency via externalRef). Those are specific financial APIs/actions (payment gateway management and initiating charges), which constitute direct financial execution authority.
Issues (2)
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
W009
MEDIUMDirect money access capability detected (payment gateways, crypto, banking).
Audit Metadata