NYC

google-calendar

Warn

Audited by Socket on Feb 19, 2026

2 alerts found:

Anomalyx2
AnomalyLOW
scripts/gcal.py

The code is a conventional, well-structured API client for Google Calendar operations. There is no indication of malicious intent or data exfiltration in this fragment. The principal security considerations involve robust input validation for time handling, resilient error reporting, and ensuring the token management in the external auth module is secure. Overall security risk remains moderate due to network exposure and external dependencies, but no active threats are evident in the provided code.

Confidence: 65%Severity: 58%
AnomalyLOW
scripts/auth.py

This module contains explicit behavior that routes OAuth token exchange and refresh through an external third-party service (google-workspace-extension.geminicli.com). The code will send refresh tokens to that external endpoint and also uses that endpoint as the OAuth redirect handler, which allows the third party to obtain authorization codes and tokens. That is a high privacy and supply-chain risk (credential exfiltration). There is no other active malware behavior (no shell/backdoor/obfuscation), but because refresh tokens can be used to access user data, this design should be considered dangerous unless the external service is trusted. Recommend not using this package or audit and replace the external endpoint with direct Google OAuth endpoints or a trusted server.

Confidence: 85%Severity: 65%
Audit Metadata
Analyzed At
Feb 19, 2026, 04:17 PM
Package URL
pkg:socket/skills-sh/sanjay3290%2Fai-skills%2Fgoogle-calendar%2F@ad234951ca6fad321ba4150895dd635444a1f02e