Mac Reminder Bridge

v2.1.2

Manage macOS Reminders.app from Docker via HTTP bridge. Use when user says: set/add/create a reminder, remind me to X, cancel/delete a reminder, mark reminde...

0· 201·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description claim to control macOS Reminders from Docker; the package contains a host-side Python listener (listener.py) that uses osascript to talk to Reminders and a client helper (send_reminder.sh) plus SKILL.md that instructs the agent to call http://host.docker.internal:5000. Required binary (curl) matches the client-side usage. Nothing in the files asks for unrelated cloud credentials or extra system access.
Instruction Scope
SKILL.md is narrowly scoped: it instructs the agent to call specific REST endpoints and mentions an optional X-Bridge-Secret header. The included listener.py runs only AppleScript (osascript) to manipulate Reminders and exposes health and CRUD endpoints. Note: the listener must be run on the macOS host and will prompt for Reminders permission; it writes logs to the repo directory. No instructions attempt to read unrelated host files or exfiltrate data externally.
Install Mechanism
No automated install spec is provided (instruction-only). README instructs cloning and running pip install -r requirements.txt and then running listener.py on the Mac — a standard, transparent manual setup. There are no downloads from obscure URLs or extracted archives in an automated install step.
Credentials
The skill package itself does not require any environment variables for the agent side (only curl). The host listener optionally reads BRIDGE_SECRET, BRIDGE_PORT, BRIDGE_ALLOWED_IPS, and DRY_RUN which are appropriate for a networked bridge. One operational caveat: the default ALLOWED_IPS includes 172.0.0.0/8 (useful for Docker networking) — if misconfigured (e.g., set to 0.0.0.0/0 without a secret) it could expose the bridge. The optional BRIDGE_SECRET is an appropriate mitigation but is not required by the skill.
Persistence & Privilege
The skill is not always-enabled and does not request elevated platform privileges beyond running a user-level Python listener on the Mac. Autonomous invocation by the agent is normal here; no skills-wide persistent/global privilege escalation is requested.
Assessment
This skill appears to be what it says: a host-side listener you run on your Mac plus client calls from inside Docker. Before installing/running: 1) Only run listener.py on a Mac you control (it uses osascript to access Reminders and will require macOS permission). 2) Secure the bridge: set BRIDGE_SECRET and/or restrict BRIDGE_ALLOWED_IPS to the specific Docker/host IPs you trust (do not set 0.0.0.0/0 without a secret). 3) Be aware logs are written next to the script (reminder_bridge.log). 4) If you run the agent in a remote/cloud environment, ensure the cloud IP is explicitly added to the allowlist or use BRIDGE_SECRET — otherwise the bridge could be reachable from unintended hosts. If you want more assurance, review the full listener.py AppleScript calls yourself before running.

Like a lobster shell, security has layers — review code before you run it.

latestvk97cx2nwmp96enpg1rxr0a9d5d82v1ve

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

🔔 Clawdis
Binscurl

Comments