Caldav

PassAudited by ClawScan on May 1, 2026.

Overview

This skill is coherent for CalDAV/Radicale management, but it does use calendar credentials and can change or delete calendar/server data when invoked.

Install only if you want an agent to manage your CalDAV calendars or Radicale server. Protect CALDAV_PASSWORD and config files, use limited-scope accounts where possible, and review create/update/delete or Radicale admin actions before allowing them to run.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone enabling this skill should expect it to use calendar account credentials and act with whatever calendar permissions those credentials have.

Why it was flagged

The scripts authenticate to a CalDAV account using local config or environment credentials, which is necessary for the skill but gives the agent delegated access to the user's calendars.

Skill content
CONFIG_PATHS = [Path.home() / ".config" / "caldav" / "config.json", Path("/etc/caldav/config.json")] ... config["password"] = os.environ["CALDAV_PASSWORD"] ... return DAVClient(... username=config.get("username"), password=config.get("password"))
Recommendation

Use a least-privileged calendar account when possible, protect the config file, and remove credentials when the skill is no longer needed.

What this means

The agent can create, modify, complete, or delete calendar events, calendars, todos, and some Radicale server state when asked to use these commands.

Why it was flagged

The documented capabilities include direct mutation and deletion of calendar data and server administration. This matches the skill's purpose, but these actions can have real user impact.

Skill content
Calendar CRUD operations (create, list, update, delete) ... Event management (create, update, delete, query) ... Todo/task management ... Radicale server configuration and administration
Recommendation

Give precise instructions for changes, review destructive actions, and avoid using --force unless you are sure the target is correct.

What this means

Using Radicale admin commands may inspect local service state or modify local user files, depending on permissions.

Why it was flagged

The Radicale administration script runs local system commands to inspect services and manage htpasswd users. This is purpose-aligned for server administration, but it is broader than simple calendar API access.

Skill content
subprocess.run(["systemctl", "status", "radicale"], ...); subprocess.run(["pgrep", "-f", "radicale"], ...); subprocess.run(cmd)
Recommendation

Run these commands only on machines where you intend to administer Radicale, and verify paths before adding or removing users.

What this means

The behavior of the skill depends partly on the installed caldav package version and its dependencies.

Why it was flagged

The skill depends on an external Python package installed without a pinned version. This is normal for this integration, but users should treat it as a supply-chain dependency.

Skill content
Install the caldav library:

```bash
pip install caldav
```
Recommendation

Install dependencies from trusted package indexes, consider pinning versions in your environment, and keep the package updated.