add-gcal-tool
Pass
Audited by Gen Agent Trust Hub on Apr 26, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches the @cocal/google-calendar-mcp package (version 2.6.1) and related dependencies from the public npm registry to enable calendar integration.
- [COMMAND_EXECUTION]: Executes administrative shell commands to configure the host file system, write configuration files, and manage system services and Docker containers.
- [PROMPT_INJECTION]: The skill introduces a surface for indirect prompt injection by allowing the agent to ingest and process data from external Google Calendar events. 1. Ingestion points: Data enters the context through tool-based calendar event listings and search results. 2. Boundary markers: No explicit delimiters or instructions are provided to the agent to distinguish or ignore potential instructions embedded in calendar data. 3. Capability inventory: The agent is granted tools to create, update, and delete calendar events, which could be leveraged if a prompt injection attack is successful. 4. Sanitization: No data validation or sanitization steps are defined for the incoming calendar content before it is processed by the agent.
Audit Metadata