google-calendar
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE] (MEDIUM): The skill is designed to store OAuth 2.0 refresh tokens and Client Secrets in the
accounts/andreferences/directories. These are long-lived sensitive credentials stored in plain text JSON files on the local filesystem. While the documentation suggests adding these to.gitignore, their existence on disk remains a security risk for credential exposure. - [Indirect Prompt Injection] (LOW): The skill fetches and displays calendar event data (summaries, descriptions) from external APIs. This untrusted data is interpolated into the agent's context without sanitization.
- Ingestion points:
fetch_events.pyreads data from the Google Calendar API. - Boundary markers: Absent. The skill does not use delimiters or instructions to ignore embedded commands in event data.
- Capability inventory:
manage_events.pyprovides create, update, and delete capabilities, which could be exploited if the agent follows instructions hidden in a calendar event. - Sanitization: Absent. Event strings are used directly for display and processing.
- [COMMAND_EXECUTION] (LOW): The skill relies on
uv run pythonto execute local helper scripts (setup_auth.py,fetch_events.py,manage_events.py). This is the intended operation of the skill but involves executing code with the user's local environment privileges.
Audit Metadata