Code Pluginsource linked

Apple PIMv3.6.2

OpenClaw plugin for macOS Calendar, Reminders, Contacts, and Mail via native Swift CLIs

apple-pim-cli·runtime apple-pim-cli·by @omarshahine
Community code plugin. Review compatibility and verification before install.
openclaw plugins install clawhub:apple-pim-cli
Latest release: v3.6.2Download zip

Capabilities

configSchema
Yes
Executes code
Yes
HTTP routes
0
Runtime ID
apple-pim-cli

Compatibility

Built With Open Claw Version
2026.3.28
Plugin Api Range
>=2026.3.23
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The code implements macOS Calendar/Reminders/Contacts/Mail handlers that invoke native Swift CLI binaries (calendar-cli, reminder-cli, contacts-cli, mail-cli) — this matches the stated purpose. However the published metadata omitted the OS restriction (package.json lists darwin but registry metadata shows none) and the registry shows no required binaries even though the handlers expect local Swift CLIs (and comment references an install target ~/.local/bin). That mismatch (missing OS restriction and missing 'required binaries') is notable: the skill will not work on non-macOS hosts and will silently fail if the CLI binaries are not installed.
Instruction Scope
Runtime instructions and handlers are narrowly scoped to calling local Swift CLIs and processing their JSON output (list/get/create/update/delete etc.). Handlers do read the user's home directory (for expanding ~/ attachments) and check file existence before sending attachments. The code also passes the agent's full environment to spawned CLIs (env: { ...process.env, ...envOverrides }), which means any environment secrets available to the agent could be visible to those CLI binaries. The project includes prompt-injection defenses (datamarking/suspicious-pattern detection), which is a positive sign.
Install Mechanism
There is no remote download/install script in the skill package — the code is bundled and npm-style dependencies are declared (mailparser, turndown). No external URLs or archive extraction are present in the package manifest. Because it's instruction/code-only, nothing arbitrary is fetched at install time by the skill itself.
Credentials
The skill declares no required environment variables or primary credential (which is appropriate for a local macOS connector). However the handlers and CLI runner forward the process environment into spawned CLI processes; if those native CLIs are untrusted, they could read any env vars present. The schemas mention an APPLE_PIM_PROFILE env in comments (used by MCP server), but requires.env lists none — another small mismatch. Overall no direct credential exfiltration is present in the JavaScript code, but care must be taken about what env vars are available when these CLIs run.
Persistence & Privilege
The skill does not request always:true and is user-invocable with default autonomous invocation allowed. It does not modify other skills or global agent configuration. It operates by spawning local CLI tools; it does not persist extra privileges itself.
What to consider before installing
What to consider before installing: - This plugin is intended for macOS and depends on native Swift CLI binaries (calendar-cli, reminder-cli, contacts-cli, mail-cli). Confirm you will run it on macOS and that you (or the vendor) will install those CLIs from a trusted source (the repository points to GitHub: omarshahine/Apple-PIM-Agent-Plugin). - The registry metadata omits the darwin OS restriction and does not declare the required binaries — verify installation instructions and that the native CLIs are present in a safe location (e.g., /usr/local/bin or ~/.local/bin) before use. - The skill spawns the native CLIs with the agent's full environment. Avoid running the agent with unnecessary secrets in environment variables (or inspect the Swift CLIs' code) because those binaries will receive the environment and could read secrets. - Attachments and file paths are accepted and expanded (~/ → home); only provide file paths you intend the mail-sender CLI to access. - The JavaScript includes prompt-injection mitigations for returned PIM data (datamarking) — a positive sign — but the real security surface includes the native Swift CLIs. Review those Swift CLI sources (or install them from a trusted release) to ensure they do not exfiltrate data or execute unexpected network activity. - If you want higher confidence: ensure the package metadata is updated to declare os: darwin and required binaries, inspect the Swift CLI source or releases referenced by the GitHub repo, and run the skill in a controlled environment first (no sensitive env vars).

Verification

Tier
source linked
Scope
artifact only
Summary
Validated package structure and linked the release to source metadata.
Commit
a2d924e22ac5
Tag
v3.6.2
Provenance
No
Scan status
pending

Tags

latest
3.6.2