Back to skill
Skillv1.13.1

ClawScan security

Email To Calendar · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignFeb 11, 2026, 8:46 AM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, scripts, and runtime instructions are coherent with its stated purpose (extracting events from emails and creating calendar entries); nothing in the package asks for unrelated credentials or installs arbitrary remote code, but it does read/write user config and workspace files and expects email/calendar access.
Guidance
This package is internally consistent with its stated purpose, but before enabling it you should: (1) Review the scripts (create_event.sh, email_read.sh, calendar_ops.py) to confirm they will call the calendar/email provider you expect (the code references a gog CLI by default). (2) Ensure your agent/platform grants only the email/calendar capabilities required (prefer granting read-only inbox scanning + calendar create/update rather than broad account credentials). (3) Prefer 'forwarded' mode if you want to avoid continuous inbox scanning. (4) Note the skill creates and updates files under ~/.openclaw/workspace/memory/ and ~/.config/email-to-calendar/, and it can auto-mark emails read/archive — check config defaults (email_handling.*) before running. (5) If you store sensitive links in emails, be conscious that the skill intentionally extracts and includes URLs in event descriptions. If anything looks unexpected in the scripts or you cannot verify provider calls, do not enable automatic/unsupervised operation until you inspect or sandbox the skill.

Review Dimensions

Purpose & Capability
okName/description match the actual files and behavior: many wrapper scripts and Python utilities implement email reading, extraction, duplicate detection, event creation, disposition, pending invites, changelog/undo, and activity logging. package.json declares required capabilities (read_email, create_calendar_event, update_calendar_event) and required binaries (python3, bash, jq) which align with the implementation.
Instruction Scope
noteSKILL.md and BOOT.md instruct the agent to read emails, load ~/.config/email-to-calendar/config.json, check memory files under ~/.openclaw/workspace/memory/, update HEARTBEAT.md, and present events for explicit user confirmation. Those actions are within the skill's purpose, but the instructions do direct reads/writes to multiple user files (memory, config, heartbeat) and require scanning emails and extracting URLs (which may include sensitive links). The agent is also instructed to send notification emails via the provider CLI when configured.
Install Mechanism
okThere is no install spec (instruction-only install), and code files are bundled with the skill. No remote downloads or extract-from-URL steps are present. Scripts rely on local Python and shell, which is proportionate to the task.
Credentials
okThe skill metadata does not request unrelated environment variables or secrets; it instead relies on platform-provided capabilities (email/calendar access) and local config files. The set of files and permissions the skill uses (config.json, memory directory, HEARTBEAT.md) are reasonable for an email→calendar automation tool.
Persistence & Privilege
notealways:false (no forced presence). The skill writes to its own memory and changelog under ~/.openclaw/workspace/memory/email-to-calendar/ and may append sections to HEARTBEAT.md per BOOT.md guidance. This is normal for a persistent assistant feature, but be aware it maintains a silent activity log and changelog/undo state in user workspace directories.