Google Calendar

ReviewAudited by ClawScan on May 10, 2026.

Overview

This skill is mostly aligned with Google Calendar access, but it under-declares its Google account credentials and exposes calendar-changing actions with limited safeguards.

Review this skill before installing. It appears intended for Google Calendar, but you should only grant the narrowest Calendar API scope you need, confirm any event update or deletion manually, and avoid running the refresh helper where access tokens could be captured in logs.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or overly autonomous invocation could change or delete calendar events.

Why it was flagged

The skill exposes event mutation and deletion in a third-party account, but the artifacts do not document explicit confirmation, dry-run, or recovery safeguards.

Skill content
- **update** an existing event by its ID
- **delete** an event by its ID
...
google-calendar delete --event-id <id>
Recommendation

Require explicit user confirmation for update/delete actions, document the expected approval flow, and consider separate read-only and write/delete modes.

What this means

Users may not realize before installation that the skill needs Google account credentials capable of reading and modifying calendar data.

Why it was flagged

This conflicts with the skill’s documented need for Google OAuth credentials and the code’s use of a bearer access token, so the registry contract under-discloses account authority.

Skill content
Required env vars: none
Env var declarations: none
Primary credential: none
Recommendation

Declare the Google credential requirements, environment variables, and intended OAuth scopes in metadata, and document least-privilege setup clearly.

What this means

Someone with access to those local files or logs could reuse the token while it is valid to access the user’s calendar.

Why it was flagged

The helper persists the bearer access token to a local plaintext env file and prints the OAuth response, which can expose the token in files, terminal history, or logs.

Skill content
new_lines.append(f'export GOOGLE_ACCESS_TOKEN={access_token}\n')
...
print(json.dumps(resp_data, indent=2))
Recommendation

Store tokens only in OpenClaw’s secret mechanism or an OS keychain, avoid printing access tokens, and document exactly where credentials are stored.

What this means

Future package versions could behave differently from what was reviewed.

Why it was flagged

The setup asks the user to install unpinned packages from PyPI. This is common for API integrations, but version pinning would improve reproducibility and reviewability.

Skill content
pip install --user google-auth google-auth-oauthlib google-api-python-client
Recommendation

Pin dependency versions or provide a lockfile, and make sure the documented OAuth helper command matches the included files.