Feishu calendar sync, local ics to json data for AI agent

v1.0.1

Convert ICS calendar files to JSON format for importing, exporting, or processing Feishu calendar events and data integration.

0· 81·0 current·0 all-time
byJay@goog
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description align with the included script (ics -> JSON). Minor mismatch: SKILL.md recommends installing vdirsyncer and 'setup calendar sync' which is related but not required to run the conversion script; SKILL.md also does not document the Python dependency (the script requires the 'icalendar' package).
Instruction Scope
Runtime instructions are limited to running the local Python script against a local directory of .ics files; the script reads files, parses events, and writes JSON outputs. It does not attempt network calls or access unrelated system paths.
Install Mechanism
No install spec (instruction-only) and included code is a small local script — low risk. Note: the skill does not declare Python package dependencies (icalendar) that must be installed separately.
Credentials
No environment variables, credentials, or config paths are requested. The skill does not request or use secrets.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges or modify other skills or system-wide settings.
Assessment
This skill is a simple local converter: review the small Python script (it only parses .ics files and writes JSON), ensure you run it in a trusted environment, and install the required Python package (pip install icalendar) before use. The SKILL.md mentions vdirsyncer only as an optional sync helper — it is not required to run the converter. If you handle sensitive calendar data, run the script locally (no network activity in the code) and inspect the output files; if you have any doubt, run it in an isolated environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk97220hp8ftyf9270bkfn1scqx83a93p

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments