MeetingPrep Auto-Generate Meeting Briefs

ReviewAudited by ClawScan on May 1, 2026.

Overview

This skill appears purpose-aligned for meeting preparation, but it may use your agent’s existing calendar, file, email, and local storage access to create briefs.

This looks suitable for its stated purpose, but install it only if you are comfortable with your agent using existing calendar and file access to prepare briefs. For sensitive meetings, tell the agent which sources to use, check where generated briefs are saved, and remove briefs you do not want retained.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The skill may read calendar events and files that your agent can already access while preparing meeting briefs.

Why it was flagged

The skill relies on whatever calendar and file permissions the user's agent platform already has. This is expected for meeting preparation, but it means the effective access boundary is the agent's existing delegated access.

Skill content
It uses your platform's built-in calendar and file access tools — no separate OAuth setup or credentials required.
Recommendation

Use it only with agent accounts and workspaces where calendar and file permissions are appropriate, and ask the agent to limit sources to the specific meeting or project when needed.

What this means

Private meeting context or internal communications could be summarized into a brief and retained locally.

Why it was flagged

Meeting briefs may include sensitive notes, emails, documents, and calendar context, and the documentation mentions local storage without specifying retention or storage location.

Skill content
Context surfacing — relevant notes, emails, docs related to attendees ... This software processes and stores data locally on your system.
Recommendation

Avoid using it for highly sensitive meetings unless you understand where briefs are stored; delete or secure generated briefs and restrict the agent to relevant sources.

What this means

It may be harder to independently verify the publisher or review update history outside the registry artifact.

Why it was flagged

The registry metadata does not provide a source repository or homepage, which limits provenance verification. The risk is reduced because no install script or dependency fetch is shown.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the registry owner and author identity before installing, especially in business environments.