PCO CLI - Planning Center Services

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used incorrectly, the agent could modify or delete Planning Center Services data in the connected account.

Why it was flagged

The skill exposes a raw API escape hatch with write and delete methods for arbitrary endpoints, without documented guardrails or confirmation requirements.

Skill content
pco api POST /endpoint --data '{"key": "value"}'
pco api PATCH /endpoint --file data.json
pco api DELETE /endpoint
Recommendation

Restrict raw API use, require explicit user confirmation for POST/PATCH/DELETE, document allowed endpoints, and prefer read-only scoped commands by default.

What this means

A user would be trusting code outside the skill package, including whatever that local path or repository version contains.

Why it was flagged

The skill directs execution of a local TypeScript file that is not included in the submitted package, so the actual CLI behavior and dependencies were not reviewable in these artifacts.

Skill content
tsx /Users/ruby/Projects/pco-cli/pco.ts <command>
Recommendation

Package the CLI code with the skill or pin a reviewed repository commit, declare required binaries such as tsx, and provide an install spec or checksum-based provenance.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

The agent may act with the user's Planning Center permissions, including access to people and scheduling data and, through the raw API, possible account changes.

Why it was flagged

The skill relies on local Planning Center credentials, but the metadata declares no primary credential, required environment variable, or config path, and the credential scope is not described.

Skill content
Credentials stored in `~/.config/pco-cli/config.json`
Recommendation

Declare the credential/config requirement, document the exact credential type and minimum permissions, and recommend least-privilege or read-only credentials where possible.