schedule-manager
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The dependency check script provides a command to install Homebrew from its official GitHub repository. This is a well-known and trusted service for macOS package management.
- [COMMAND_EXECUTION]: The skill uses
osascriptandreminders-clito perform its core functions of reading and writing to the macOS Calendar and Reminders databases. These commands are necessary for the skill's purpose and do not require root privileges. - [DATA_EXPOSURE]: The skill reads planning data from local YAML files located in
~/code/*/planning/schedules/. This access is localized and serves the specific purpose of aggregating project schedules for weekly reviews. - [INDIRECT_PROMPT_INJECTION]: The skill processes untrusted planning data from local YAML files, which represents an indirect prompt injection surface.
- Ingestion points: Local YAML files at
~/code/*/planning/schedules/*.yaml. - Boundary markers: Absent; instructions do not specify delimiters for parsed data.
- Capability inventory: Full read/write/delete access to Calendar and Reminders via
osascriptandreminders-cli. - Sanitization: No explicit validation or sanitization of the YAML content is mentioned before it is processed by the agent.
Audit Metadata