Course Schedule Export

v1.0.0

Turn school or university timetables into checked .ics calendars. Use when an agent needs to normalize and verify schedules from xls/xlsx, screenshots, PDFs,...

0· 105·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description match the included artifacts: normalization/verification guidance in SKILL.md plus two helper scripts (coverage checker and .ics generator) that directly serve that purpose.
Instruction Scope
SKILL.md confines runtime actions to normalizer/verification workflow and running the two included scripts; it does not instruct reading unrelated system credentials or contacting external endpoints. It requires user-supplied manifest/coverage files and asks the agent to poll the user for missing school-specific parameters.
Install Mechanism
No install spec or third-party downloads; the included Python scripts are standard-library-only and will run without extra installs.
Credentials
No environment variables, credentials, or config paths are requested. The scripts operate on user-supplied manifest/coverage file paths only.
Persistence & Privilege
Skill is not always-enabled and does not modify other skills or system-wide settings. It runs only when invoked and writes an .ics to the provided output path (or next to the manifest).
Assessment
This skill appears coherent and safe for its stated purpose. Before running: 1) Review the manifest and coverage JSON paths you pass to the scripts — they will read those files and the .ics generator will write to the specified output (or overwrite manifest.with_suffix('.ics')). 2) Supply correct week-1, slots, and timezone values as SKILL.md requires to avoid incorrect dates. 3) If you plan to run the skill autonomously, remember it will read whatever manifest/coverage paths the agent is given, so avoid pointing it at sensitive system files. Otherwise, the included scripts use only the Python standard library and contain no network or credential-exfiltration logic.

Like a lobster shell, security has layers — review code before you run it.

latestvk97003pcm2sc4y3ymm47dz0kf9837yw5

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments