Email To Calendar
v1.13.1Extract calendar events and action points from forwarded emails, store them for review, and create calendar events with duplicate detection. Use when the user forwards an email containing meeting invites, events, deadlines, or action items, and wants to extract structured items for calendar creation. Also use when the user asks to review previously extracted items or create calendar events from them.
⭐ 5· 5.3k·29 current·30 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Benign
high confidencePurpose & Capability
Name/description match the actual files and behavior: many wrapper scripts and Python utilities implement email reading, extraction, duplicate detection, event creation, disposition, pending invites, changelog/undo, and activity logging. package.json declares required capabilities (read_email, create_calendar_event, update_calendar_event) and required binaries (python3, bash, jq) which align with the implementation.
Instruction Scope
SKILL.md and BOOT.md instruct the agent to read emails, load ~/.config/email-to-calendar/config.json, check memory files under ~/.openclaw/workspace/memory/, update HEARTBEAT.md, and present events for explicit user confirmation. Those actions are within the skill's purpose, but the instructions do direct reads/writes to multiple user files (memory, config, heartbeat) and require scanning emails and extracting URLs (which may include sensitive links). The agent is also instructed to send notification emails via the provider CLI when configured.
Install Mechanism
There is no install spec (instruction-only install), and code files are bundled with the skill. No remote downloads or extract-from-URL steps are present. Scripts rely on local Python and shell, which is proportionate to the task.
Credentials
The skill metadata does not request unrelated environment variables or secrets; it instead relies on platform-provided capabilities (email/calendar access) and local config files. The set of files and permissions the skill uses (config.json, memory directory, HEARTBEAT.md) are reasonable for an email→calendar automation tool.
Persistence & Privilege
always:false (no forced presence). The skill writes to its own memory and changelog under ~/.openclaw/workspace/memory/email-to-calendar/ and may append sections to HEARTBEAT.md per BOOT.md guidance. This is normal for a persistent assistant feature, but be aware it maintains a silent activity log and changelog/undo state in user workspace directories.
Assessment
This package is internally consistent with its stated purpose, but before enabling it you should: (1) Review the scripts (create_event.sh, email_read.sh, calendar_ops.py) to confirm they will call the calendar/email provider you expect (the code references a gog CLI by default). (2) Ensure your agent/platform grants only the email/calendar capabilities required (prefer granting read-only inbox scanning + calendar create/update rather than broad account credentials). (3) Prefer 'forwarded' mode if you want to avoid continuous inbox scanning. (4) Note the skill creates and updates files under ~/.openclaw/workspace/memory/ and ~/.config/email-to-calendar/, and it can auto-mark emails read/archive — check config defaults (email_handling.*) before running. (5) If you store sensitive links in emails, be conscious that the skill intentionally extracts and includes URLs in event descriptions. If anything looks unexpected in the scripts or you cannot verify provider calls, do not enable automatic/unsupervised operation until you inspect or sandbox the skill.Like a lobster shell, security has layers — review code before you run it.
latestvk97d258fkk7xfye22zppm7gkv180natb
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
