gcal-pro - Google Calendar

PassAudited by VirusTotal on May 12, 2026.

Findings (1)

The OpenClaw AgentSkills bundle for 'gcal-pro' is classified as benign. The skill's code (`gcal_auth.py`, `gcal_core.py`, `gcal_license.py`) and documentation (`SKILL.md`, `README.md`, `docs/GOOGLE_CLOUD_SETUP.md`) consistently describe and implement a Google Calendar integration. There is no evidence of data exfiltration, malicious execution (e.g., `curl|bash`, `eval`/`exec` of untrusted input), persistence mechanisms beyond a user-configured cron for morning briefs, or prompt injection attempts against the agent. Sensitive files like `client_secret.json` and `token.json` are handled securely in `~/.config/gcal-pro/` with appropriate file permissions (`0o600`). All network calls are to legitimate Google OAuth and Calendar API endpoints, and requested scopes are appropriate for calendar management.