Calendar Local

PassAudited by VirusTotal on Mar 31, 2026.

Findings (1)

The skill bundle facilitates local Google Calendar access by executing a shell script at a hardcoded path (/home/ubuntu/.openclaw/workspace/.openclaw/calendar.sh). It is classified as suspicious due to a potential shell injection vulnerability in the 'days N' command workflow, where the variable 'N' is derived from user input without explicit sanitization instructions in SKILL.md. While the use of the GOG_KEYRING_PASSWORD environment variable is consistent with the stated purpose, the reliance on an external, unprovided script and the lack of input validation pose a security risk.