macos-calendar

Pass

Audited by Gen Agent Trust Hub on Mar 22, 2026

Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: Executes AppleScript commands via the osascript utility to interface with the macOS Calendar application. This capability is used to create, modify, and delete user events.
  • [EXTERNAL_DOWNLOADS]: Features a subscription mechanism in scripts/calendar/subscribe.applescript that allows the agent to add external webcal or HTTP calendar feeds to the local application.
  • [DATA_EXFILTRATION]: Accesses and displays sensitive information from calendar events, including full descriptions, meeting locations, and attendee email addresses as seen in scripts/event/get.applescript.
  • [PROMPT_INJECTION]: Processes untrusted data from calendar event summaries and descriptions which could contain malicious instructions designed to influence the agent's behavior (Indirect Prompt Injection). Ingestion points include event list and search scripts (e.g., scripts/event/list.applescript, scripts/event/search.applescript). Boundary markers are absent in the prompt templates. Capability inventory includes event modification and deletion (scripts/event/delete.applescript). No specific sanitization or escaping of event content is implemented before it is returned to the agent context.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 22, 2026, 04:27 PM