Is h8kxrfp68z-lgtm/icalendar-sync safe?

https://github.com/openclaw/skills/tree/main/skills/h8kxrfp68z-lgtm/icalendar-sync

79
CAUTION

The iCalendar Sync skill presents a fundamentally split profile: its Python source code is competently written with genuine security controls, the SKILL.md is free of prompt injection, and the install produced no malicious network activity or honeypot exfiltration. However, the author's behavior is demonstrably adversarial toward security review — multiple versions in 1.6 days were published exclusively to bypass ClawHub's scanner, and the source itself contains an admission that prior versions deliberately hid the credential requirement. The install.sh content was not disclosed in the evidence, leaving a material gap; the skill also requires privileged iCloud calendar access, creating meaningful privacy risk if a future malicious update were pushed by this author.

Category Scores

Prompt Injection 88/100 · 30%
Data Exfiltration 68/100 · 25%
Code Execution 75/100 · 20%
Clone Behavior 83/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 48/100 · 5%

Findings (8)

HIGH Prior version deliberately hid credential requirements — admitted in source -30

The skill.yaml contains an explicit comment acknowledging that cached metadata or a prior version claimed no credentials were required, despite credentials being mandatory. This is a direct admission of having previously deceived the security review pipeline by hiding the credential requirement. Hiding credential requirements is a known technique to lower the perceived risk of a skill during automated scanning.

HIGH Systematic security scanner evasion across 10 versions in 1.6 days -22

The version history shows a concentrated effort to pass automated security scanning rather than deliver functional improvements. Versions 2.2.3 through 2.3.0 were published in approximately 1.6 days (143,285 seconds). Changelog entries for multiple versions are dedicated exclusively to addressing scanner-specific issues: metadata format, security documentation, re-indexing, and credential declaration. This pattern indicates adversarial awareness of the scanning system and deliberate manipulation of it.

MEDIUM install.sh content not disclosed in audit evidence -25

The repository includes install.sh and SKILL.md instructs users to run it directly ('bash ./install.sh'). The oathe audit system installed via copy-only, so the script was never executed during this audit. The file was read by the source auditor (auditd record 852) but its full content is not present in the provided evidence, leaving a gap in safety verification. Malicious install scripts are a primary delivery vector for skills that otherwise appear clean.

MEDIUM Full iCloud CalDAV access required — significant privacy exposure -25

The skill requires an iCloud app-specific password and connects with full principal access to caldav.icloud.com, granting read/write access to all calendars. Calendar data exposes meeting schedules, attendees, locations, and personal commitments. The skill provides no scoping or minimum-privilege model — it requests access to all calendars. Credentials can also be supplied via plain environment variables (ICLOUD_APP_PASSWORD), which are often logged or visible in process listings.

LOW Sensitive credential files accessed during monitoring — attributed to oathe infrastructure -7

Filesystem monitoring detected reads of .env, .ssh/id_rsa, .aws/credentials, .npmrc, .docker/config.json, and GCloud credentials. However, critical context establishes these were not caused by the skill: (1) accesses occurred at audit timestamp 1771904145.059, approximately 5 seconds before the git clone began at 1771904150.493; (2) the skill had not yet been installed when these reads occurred; (3) canary integrity confirmed all files intact. This pattern is consistent with the oathe platform seeding honeypot files at monitoring initialization. Recorded as a finding for completeness.

LOW Credential-collection command accessible to agent in active session -12

The 'setup' command (permissions: [admin]) interactively prompts for iCloud email and app-specific password and stores them in the system keyring. When this skill is injected into an agent's system prompt, an adversarial user prompt or a malicious co-installed skill could chain a 'setup' invocation, causing the agent to prompt the user for credentials outside the expected flow or collect them in a misleading context.

LOW Suspicious author account naming convention -12

The publisher username 'h8kxrfp68z-lgtm' combines an apparent random hash prefix with '-lgtm' (Looks Good To Me). This naming pattern is atypical for legitimate skill authors and is consistent with a purpose-built account designed to mock or signal awareness of approval workflows.

INFO Python source code contains appropriate security controls 0

The reviewed Python source (calendar.py, i18n.py, init.py, main.py, translations_extended.py) implements rate limiting (10 calls/60s), credential redaction in logs via SensitiveDataFilter, SSL verification enforcement, input validation on calendar names including path traversal prevention, and JSON file size limits. These are defensive measures consistent with a legitimate security-conscious implementation.