Prompt injection instructions
- Finding
- Prompt-injection style instruction pattern detected.
Security checks across static analysis, malware telemetry, and agentic risk
The skill mostly matches its calendar-sync purpose, but its direct Apple Calendar mode builds and runs AppleScript from document text in a way that could allow crafted input to run unintended commands.
Install only if you are comfortable with document-derived data being written to Calendar/ICS files. Prefer the ICS generation path and inspect the file before importing. Do not use direct AppleScript registration with untrusted document data until the script safely validates and escapes all fields.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If direct AppleScript mode is used on macOS, a malicious or malformed document title/date could break out of the intended Calendar event fields and run unintended AppleScript commands with the user's local permissions.
The direct-registration path takes values from structured_results.json, inserts them into an AppleScript string, and executes it with osascript. The title and deadline fields are not escaped or validated before becoming executable AppleScript.
title = create_event_title(doc)
deadline = dates.get("deadline")
...
summary:"{title} - 마감",
start date:eventDate,
...
result = subprocess.run(
['osascript', '-e', script],Prefer the default ICS-file workflow for now. Before enabling direct AppleScript registration, validate dates, safely escape all AppleScript string literals, or pass values as osascript arguments rather than interpolating document text into executable code.
The skill may fail until the dependency is installed, and an unpinned package install can change behavior over time.
The script depends on the external icalendar package, but the artifact set has no install spec or version pin. This is purpose-aligned, but users should install it from a trusted source.
from icalendar import Calendar, Event, Alarm
...
print(" pip install icalendar")Use a virtual environment and pin a known-good icalendar version in an install spec or requirements file.
Granting Calendar access lets the skill add events and reminders that may sync across the user's Apple devices or accounts.
The skill can use the user's local Calendar app authority to create calendars and events. This matches the stated purpose, but it is still account/app data mutation.
tell application "Calendar"
if not (exists calendar "문서 일정") then
make new calendar with properties {name:"문서 일정"}
end if
tell calendar "문서 일정"
make new event with properties {Use a separate calendar such as "문서 일정", review generated events, and prefer ICS preview/import if you do not want the agent to modify Calendar directly.
Private business or document details may become part of calendar entries and may be synced or shared wherever that calendar is available.
The skill stores document summaries, financial amounts, and original file paths in calendar event descriptions or ICS files. This is disclosed and purpose-aligned, but it persists potentially sensitive document context.
lines.append(f"요약: {doc['summary'][:200]}")
lines.append(f"금액: {amount:,.0f}원")
lines.append(f"원본: {meta['filepath']}")
...
event.add('description', description)Redact sensitive fields before syncing, use a local or separate calendar when possible, and avoid importing events from confidential documents unless this storage is acceptable.