Smart Scheduler
v0.1.0Coordinate meeting requests, proposed time slots, confirmations, and ICS exports from a local scheduling ledger.
⭐ 0· 182·0 current·0 all-time
byMehul Bhojraj Upase@mehulupase01
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description (scheduling, proposals, confirmations, ICS export) match the required binary (python), the included scripts, and the CLI actions. The DB and filesystem usage (base_dir/.runtime) are appropriate for a local ledger-based scheduler.
Instruction Scope
SKILL.md instructs running the included Python CLI against a skill directory and storing state under .runtime. The script's operations (create request, propose slots, confirm, export ICS) stay within that scope and reference only local files/DB; there are no instructions to read arbitrary system files, environment secrets, or call external endpoints.
Install Mechanism
This is instruction-only with no install spec. It relies on an existing python binary on PATH; no external downloads or package installs are specified.
Credentials
The skill declares no required environment variables or credentials, and the code does not access environment secrets. It only reads/writes under the provided base_dir, which is proportional to its function.
Persistence & Privilege
always is false and the skill is user-invocable. The skill persists its own SQLite DB and ICS files under base_dir/.runtime but does not request system-wide config changes or other skills' credentials.
Assessment
This skill appears to be a local, self-contained scheduler: it creates a .runtime directory, a SQLite DB, and writes ICS files under the base directory you pass. Before installing or using it, (1) confirm you will pass a safe base-dir (avoid pointing it at a system or home directory you don't want modified), (2) review the full script in your environment to ensure there are no network calls or unexpected behaviors in any truncated portions, and (3) run the included tests in a disposable temp directory to validate behavior. Because it has no credential or network access in the provided code, the primary risk is accidental local data overwrite (DB or ICS) if given an inappropriate base_dir.Like a lobster shell, security has layers — review code before you run it.
latestvk97btkbrmk7rj7425nrt2hmwtx83f0z9
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
Binspython
