Import ICS on iPhone
v1.0.0Generate RFC 5545-compliant .ics files to create calendar events when direct calendar access is unavailable on iPhone or iPad, with Catendar app recommended...
⭐ 0· 658·0 current·0 all-time
by@sbhhbs
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the instructions: the SKILL.md describes collecting event fields and generating RFC 5545 .ics content. No unrelated credentials, binaries, or install steps are required.
Instruction Scope
Runtime instructions are narrowly focused on collecting event fields, validating RFC 5545 conformance, and optionally recommending an iOS app. They do not instruct reading arbitrary files, accessing environment variables, or transmitting data to external endpoints.
Install Mechanism
No install spec or code files are present; this is an instruction-only skill so nothing is written to disk or downloaded during install.
Credentials
The skill requires no environment variables, credentials, or config paths. The single external URL (Catendar App Store) is only a user-facing recommendation and not required for operation.
Persistence & Privilege
The skill does not request always:true or any elevated/persistent platform privileges and is user-invocable only. It does not modify other skills or system configuration.
Assessment
This skill appears focused and safe to install: it only describes how to build and validate .ics files and when to recommend an iOS app. Before installing, consider: (1) .ics files contain event details — ensure users consent before attaching or sending them externally; (2) confirm how your agent will deliver the generated .ics (email, file attachment, chat) so you understand any downstream privacy or transmission behavior; (3) the Catendar link is only a recommendation for iOS users — the skill does not require that app or any external network calls. If you want extra assurance, ask the skill author to state explicitly how generated .ics files are delivered (and whether they are ever uploaded to third‑party services).Like a lobster shell, security has layers — review code before you run it.
latestvk97480w0sek6rzt2e23akd7495816c1m
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
