niuamaxia-scheduler

Pass

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill operates by executing a local CLI utility 'niuamaxia' and custom Python scripts located in the 'scripts/' directory to manage scheduling logic.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes task names, priorities, and descriptions from user input and system calendar events.
  • Ingestion points: Task metadata and existing calendar entries.
  • Boundary markers: Absent.
  • Capability inventory: Read/write access to macOS System Calendar and local JSON data files.
  • Sanitization: Not documented.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 21, 2026, 04:45 PM