schedule-manager

Pass

Audited by Gen Agent Trust Hub on Mar 6, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill makes extensive use of osascript to interact with macOS system applications (Calendar and Reminders). This allows the agent to read, create, and delete personal scheduling data directly through shell execution.
  • [EXTERNAL_DOWNLOADS]: The skill directs users to install reminders-cli via a third-party Homebrew tap (keith/formulae/reminders-cli). It also includes the standard installation command for Homebrew which involves executing a remote script from raw.githubusercontent.com/Homebrew/install via bash. While Homebrew is a well-known service, the third-party tap represents an unverifiable dependency.
  • [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection (Category 8) as it processes untrusted data from external sources.
  • Ingestion points: Data is ingested from Calendar event summaries, descriptions, and Reminder notes via osascript and reminders-cli queries in files such as references/osascript-calendar.md and references/osascript-reminders.md.
  • Boundary markers: No boundary markers or 'ignore' instructions are present to prevent the agent from following commands embedded in calendar events or reminders.
  • Capability inventory: The skill possesses the ability to execute system commands via osascript and manage local files/reminders.
  • Sanitization: There is no evidence of sanitization or filtering applied to the text retrieved from the system applications before it is presented to the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 6, 2026, 11:04 AM