Eventkit Integration

v1.0.0

EventKit integration patterns, permission handling, zero-width character steganography, and batch operations for macOS/iOS apps

0· 118·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for soponcd/eventkit-integration.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Eventkit Integration" (soponcd/eventkit-integration) from ClawHub.
Skill page: https://clawhub.ai/soponcd/eventkit-integration
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install eventkit-integration

ClawHub CLI

Package manager switcher

npx clawhub@latest install eventkit-integration
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
Name/description (EventKit, permissions, batch ops, steganography) match the Swift snippets and runtime guidance. No unrelated environment variables, binaries, or installs are requested.
Instruction Scope
Instructions stay focused on EventKit patterns (calendar creation, permission checks, batch fetch/delete, sync binding). However the guidance explicitly recommends embedding invisible zero-width signatures in reminder notes for identity tracking — a covert channel that may leak identifiers when notes sync to cloud/shared calendars. Batch delete and 'self-healing' behavior also require careful guardrails to avoid accidental data loss.
Install Mechanism
Instruction-only skill with no install spec and no code files to write or execute. Lowest install risk.
Credentials
No credentials, environment variables, or filesystem paths are requested. The data access described (EventKit, local model context) is appropriate for the stated purpose.
Persistence & Privilege
Skill is not forced-always; it does not request elevated or persistent platform privileges. Autonomous invocation is allowed by default but not combined with broad credentials or installs.
Assessment
This skill appears to do what it says (EventKit integration) and doesn’t request secrets or install software, but it contains two areas to be cautious about: 1) Zero-width steganography: The skill recommends embedding invisible markers in reminder notes to track identity. That is a covert channel — those markers can be synchronized to iCloud or shared calendars and could leak user or device identifiers. If you plan to use this, ensure explicit user consent, clear privacy disclosures, and consider safer alternatives (signed metadata stored in your app's private database or encrypted metadata fields), and verify App Store/privacy policy compliance. 2) Bulk delete / self-healing logic: The batch delete and zombie purge patterns can remove many reminders. Add safeguards: confirmations, dry-run modes, rate-limits, backups, and robust checks to avoid deleting items created by other apps or users. Test thoroughly on non-production data. Other recommendations: review regex and Unicode handling (ensure the extraction works reliably), ensure permission prompts follow platform guidelines, and log minimal data. If you need greater assurance about potential covert channels or third-party exposure, request the full source files or a code review before installing.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

📅 Clawdis
latestvk97176bsqyyn0qbamg3f0pwtrh83jz30
118downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

EventKit Integration

Expert-level EventKit patterns for macOS/iOS applications. Specialized for reminder systems, permission handling, and bidirectional sync.

When to Use

Use this skill when:

  • Integrating EventKit Reminders or Events
  • Handling EventKit permissions and authorization
  • Implementing bidirectional sync with external data
  • Using zero-width character steganography for identity tracking
  • Batch EventKit operations
  • Building zombie task self-healing logic

Core Principles

1. Actor-Based Service

import EventKit
import Foundation

actor EventKitService {
    private let eventStore = EKEventStore()
    private var timeFlowCalendar: EKCalendar?

    func initialize() async throws {
        let remindersGranted = try await eventStore.requestFullAccessToReminders()
        let eventsGranted = try await eventStore.requestFullAccessToEvents()

        guard remindersGranted && eventsGranted else {
            throw EventKitError.permissionDenied
        }

        timeFlowCalendar = try await getOrCreateTimeFlowCalendar()
    }
}

2. Calendar Management

private func getOrCreateTimeFlowCalendar() async throws -> EKCalendar {
    let calendars = eventStore.calendars(for: .reminder)

    if let existing = calendars.first(where: { $0.title == "TimeFlow" }) {
        return existing
    }

    let calendar = EKCalendar(for: .reminder, eventStore: eventStore)
    calendar.title = "TimeFlow"
    calendar.source = eventStore.defaultCalendarForNewReminders()?.source

    try eventStore.saveCalendar(calendar, commit: true)
    return calendar
}

3. Batch Fetch Pattern

func fetchAllReminders() async throws -> [ReminderSnapshot] {
    guard let calendar = timeFlowCalendar else {
        throw EventKitError.calendarNotFound
    }

    let incompletePredicate = eventStore.predicateForIncompleteReminders(
        withDueDateStarting: nil, ending: nil, calendars: [calendar]
    )

    return try await withCheckedThrowingContinuation { continuation in
        eventStore.fetchReminders(matching: incompletePredicate) { reminders in
            if let reminders = reminders {
                let snapshots = reminders.map { $0.toSnapshot() }
                continuation.resume(returning: snapshots)
            } else {
                continuation.resume(returning: [])
            }
        }
    }
}

Permission Handling

Authorization Flow

enum EventKitError: Error, LocalizedError {
    case permissionDenied
    case calendarNotFound

    var errorDescription: String? {
        switch self {
        case .permissionDenied:
            return "需要访问提醒事项的权限"
        case .calendarNotFound:
            return "找不到 TimeFlow 日历"
        }
    }
}

Check Before Operations

func updateReminder(_ reminder: EKReminder) async throws {
    // Verify calendar exists before operation
    guard timeFlowCalendar != nil else {
        throw EventKitError.calendarNotFound
    }

    try eventStore.save(reminder, commit: true)
}

Sync Patterns

Zero-Width Character Steganography

Embed identity signatures invisibly in EventKit notes:

func buildNotes(from task: IdentityMap) -> String {
    let baseNotes = task.notesSnapshot ?? ""

    // Embed zero-width signature for identity tracking
    let signature = "\u{200B}TIMEFLOW:\(task.localUUID)\u{200C}"

    return baseNotes.isEmpty ? signature : baseNotes + "\n" + signature
}

func extractSignature(from notes: String?) -> String? {
    guard let notes = notes else { return nil }

    let pattern = #"\u{200B}TIMEFLOW:([^\u{200B}]+)\u{200C}"#
    guard let regex = try? NSRegularExpression(pattern: pattern),
          let match = regex.firstMatch(in: notes, range: NSRange(notes.startRange, in: notes)) else {
        return nil
    }

    guard let range = Range(match.range(at: 1), in: notes) else { return nil }
    return String(notes[range])
}

Critical: Prevent Sync Loops

When creating new IdentityMap from EventKit, bind immediately:

private func findOrCreateIdentityMap(for reminder: ReminderSnapshot) -> IdentityMap? {
    if let existing = swiftDataService.findIdentityMap(by: reminder.id) {
        return existing
    }

    let newMap = swiftDataService.createIdentityMap(
        title: reminder.title,
        projectName: nil,
        contextTags: []
    )

    // CRITICAL: Bind immediately and mark as clean
    // This prevents: New Map -> Dirty -> Push -> Duplicate infinite loop
    newMap.ekIdentifier = reminder.id
    newMap.lastSyncDate = Date()
    newMap.isDirty = false

    return newMap
}

Batch Operations

Batch Delete with Chunking

func deleteReminders(identifiers: [String]) async throws -> Int {
    var deletedCount = 0
    let batchSize = 500

    for id in identifiers {
        if let reminder = eventStore.calendarItem(withIdentifier: id) as? EKReminder {
            try eventStore.remove(reminder, commit: false)
            deletedCount += 1
        }

        // Commit in batches for performance
        if deletedCount % batchSize == 0 {
            try eventStore.commit()
        }
    }

    // Final commit
    try eventStore.commit()
    return deletedCount
}

Zombie Task Self-Healing

Grace Period Pattern

Don't delete immediately created tasks:

nonisolated func purgeZombieTasksBackground() {
    let context = ModelContext(container)
    context.autosaveEnabled = false

    // Grace period: 1 hour
    // Newly created tasks have nil ekID, but aren't zombies
    let oneHourAgo = Date().addingTimeInterval(-3600)

    let descriptor = FetchDescriptor<IdentityMap>(
        predicate: #Predicate { $0.ekIdentifier == nil && $0.createdAt < oneHourAgo }
    )

    let zombies = (try? context.fetch(descriptor)) ?? []
    guard !zombies.isEmpty else { return }

    // Group by title to identify duplicates
    let grouped = Dictionary(grouping: zombies, by: { $0.titleSnapshot })

    for (title, tasks) in grouped where tasks.count > 1 {
        // Keep oldest, delete duplicates
        let sorted = tasks.sorted { $0.createdAt < $1.createdAt }
        for task in sorted.dropFirst() {
            context.delete(task)
        }
    }

    try? context.save()
}

Testing Patterns

Mock EventKit for Tests

@MainActor
final class EventKitServiceTests: XCTestCase {
    var mockService: MockEventKitService!

    override func setUp() async throws {
        try await super.setUp()
        mockService = MockEventKitService()
    }

    func testFetchAllReminders() async throws {
        // Given: Mock reminders
        mockService.addReminder(id: "EK-1", title: "Task 1")
        mockService.addReminder(id: "EK-2", title: "Task 2")

        // When: Fetch
        let reminders = try await mockService.fetchAllReminders()

        // Then: Verify
        XCTAssertEqual(reminders.count, 2)
    }
}

Best Practices

PracticeReason
Use actor for EventKitServiceThread-safe access to EKEventStore
Check permissions before operationsPrevents silent failures
Batch operations with commitImproves performance
Bind ekID immediately on createPrevents sync loops
Use grace period for zombie purgeAllows sync time for new tasks
Extract zero-width signatures carefullyIdentity recovery across ID changes

Common Pitfalls

PitfallConsequencePrevention
Sync loop (infinite duplicates)Database bloat + sync chaosBind ekIdentifier immediately on create
Missing permission checksSilent failuresCheck authorization before each operation
Deleting too eagerlyLost tasks on slow syncUse 1-hour grace period
N+1 EventKit queriesSlow sync performanceBatch fetch, then process in-memory
Committing on each deleteSlow performanceChunk and batch commits

Running EventKit Tests

# Test EventKit integration
xcodebuild test -scheme YourApp \
  -destination 'platform=macOS' \
  -only-testing:'YourAppTests/EventKitTests/testFetchAllReminders'

Comments

Loading comments...