Pear MCP iCloud Calendar, Reminders & Contacts

PassAudited by ClawScan on May 10, 2026.

Overview

This is a clearly described iCloud calendar/reminders/contacts integration, but it gives Pear and the agent sensitive read/write access, including deletion and batch changes.

Before installing, make sure you trust Pear with your iCloud calendars, reminders, and contacts. Treat delete, update, and batch operations as high-impact, confirm them carefully, and revoke the API key or iCloud app-specific password if you stop using the integration.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing and using this skill can allow the agent, through Pear, to access and change your calendars, reminders, and contacts.

Why it was flagged

The skill explicitly requires delegated access to sensitive iCloud account data and can both read and modify it; this is purpose-aligned but high-impact.

Skill content
Pear provides read/write access to iCloud Calendar, Reminders, and Contacts
Recommendation

Use it only if you trust Pear with this iCloud data, use an app-specific password as instructed, and revoke the key or iCloud connection when no longer needed.

What this means

A mistaken or poorly reviewed request could delete or change iCloud data that then syncs across devices.

Why it was flagged

The tool set includes destructive and batch mutation operations. These are consistent with a contacts-management skill, but mistakes could have significant user impact.

Skill content
`pear_delete_contact` | Delete a contact ... `pear_delete_contacts_batch` | Delete up to 50 contacts in one call
Recommendation

Confirm destructive or bulk actions explicitly, especially deletes, updates, and batch contact/event/reminder operations.

What this means

Personal contacts, calendars, attendee details, phone numbers, emails, addresses, and reminders may pass through Pear's service.

Why it was flagged

Sensitive calendar/contact/reminder data is accessed through the external Pear MCP endpoint. This is disclosed and purpose-aligned, but it creates a third-party data boundary.

Skill content
network:
        - pearmcp.com ... `pear_list_contacts` | List all contacts with full vCard data
Recommendation

Review Pear's privacy/security practices and avoid using a custom PEAR_MCP_URL unless you fully trust that endpoint.

What this means

The scanner cannot verify the hosted Pear MCP implementation from the provided artifacts.

Why it was flagged

The artifacts do not include local implementation code to inspect; functionality depends on the external Pear service rather than reviewed local code.

Skill content
Source: unknown ... No install spec — this is an instruction-only skill.
Recommendation

Install only if you trust the publisher/service and verify the homepage and account setup path before entering credentials.