Apple Notes (AppleScript)

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill largely matches its Apple Notes purpose, but it needs review because it can overwrite/delete notes, has unsafe AppleScript argument interpolation, and copies note attachments into /tmp.

Only install this if you are comfortable granting the agent access to your Apple Notes. Prefer exact note IDs and folder-scoped commands, avoid delete/edit unless you have reviewed the target and have backups, and clear /tmp/notes-export if attachments are extracted.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A crafted limit value could change the AppleScript that runs, potentially escaping the intended Notes-only workflow and executing other AppleScript actions under the user's account.

Why it was flagged

A command argument is assigned to LIMIT and later inserted directly into the generated osascript program outside a quoted or validated AppleScript literal.

Skill content
else LIMIT="$arg"; fi ;; ... set maxCount to $LIMIT as integer
Recommendation

Validate numeric arguments before use, pass values to osascript as arguments instead of string-building code, and quote/escape all AppleScript literals consistently.

What this means

The agent could delete the wrong note if a partial title matches unexpectedly, especially in a large Notes collection.

Why it was flagged

The delete command performs a destructive action on the first partial name match, with no built-in confirmation or dry-run step.

Skill content
# Delete a note by name (partial match) ... if name of n contains searchTerm then ... delete n
Recommendation

Require exact note IDs or exact title matches for destructive actions, show the matched note first, and require explicit user confirmation before deleting or overwriting content.

What this means

Sensitive attachments such as receipts, medical documents, or scans may remain as copied files in /tmp after a read operation.

Why it was flagged

Reading a note can copy attachment PDFs/images from the local Notes account storage into /tmp/notes-export, leaving sensitive retrieved content outside Notes.

Skill content
ACCOUNTS_DIR="$HOME/Library/Group Containers/group.com.apple.notes/Accounts/" ... OUTPUT_DIR="/tmp/notes-export/" ... cp "$found_file" "$output_path"
Recommendation

Make attachment extraction explicit and opt-in, document the output location, use a user-chosen directory with restrictive permissions, and provide cleanup guidance.

What this means

Granting this skill Notes automation access lets it read or search broadly across the user's Notes data, not just one folder.

Why it was flagged

When no folder is specified, the helper builds an AppleScript scope covering every note available to the current Notes app account.

Skill content
if [ -z "$folder" ]; then FOLDER_SCRIPT="set noteList to every note"
Recommendation

Use folder-scoped commands where possible and only grant macOS Notes automation access if broad Notes access is acceptable.