calendar
Fail
Audited by Gen Agent Trust Hub on Apr 11, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
calendar_cli.shis vulnerable to AppleScript injection. The parametersstart_dateandend_dateare parsed from user-controllable JSON input and directly interpolated into a command string passed toosascript -e. An attacker could provide a crafted date string (e.g., using quotes and AppleScript commands) to break out of the intended logic and execute arbitrary AppleScript. Because AppleScript can execute shell commands via thedo shell scriptcommand, this allows for full command execution on the host system. - [DATA_EXFILTRATION]: The injection vulnerability in the
osascriptcommand allows for unauthorized access to sensitive system data. Beyond accessing all calendar events regardless of the intended date range, an attacker could usedo shell scriptto read local files (such as SSH keys or environment variables) and exfiltrate them via network requests. - [COMMAND_EXECUTION]: The script uses shell variables inside a string executed by
osascriptwithout any validation or sanitization. Specifically, incalendar_cli.sh:EVENTS=$(osascript -e "... (date \"$START_DATE\") ..."). If$START_DATEcontains") or (do shell script "curl ...") or (date ", it will trigger unintended code execution. - [DATA_EXFILTRATION]: The skill facilitates the ingestion of data from the macOS Calendar application into the agent's context. This represents an attack surface for indirect prompt injection if the agent processes malicious instructions embedded in calendar event summaries.
Recommendations
- AI detected serious security threats
Audit Metadata