skills/openclaw/skills/caldav/Gen Agent Trust Hub

caldav

Pass

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection as it ingests untrusted data from external CalDAV servers and imported ICS files. Ingestion points were found in scripts/events.py, scripts/todos.py, and scripts/calendars.py, where fields such as event summaries, descriptions, and locations are read. The skill does not implement boundary markers or sanitization for these strings, which could allow a malicious calendar entry to influence the agent's behavior. \n- [COMMAND_EXECUTION]: The scripts/radicale.py script uses the subprocess module to execute system commands including systemctl status, pgrep, and htpasswd. While these calls are implemented using argument lists (avoiding shell injection), they provide the agent with the capability to monitor and manage local system services and user credentials.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 9, 2026, 05:33 AM