ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      xushen-ma

      Safety Report

      Apple Cal Anywhere

      @xushen-ma

      Your Apple Calendar, on any platform. iCloud Calendar skill via CalDAV (RFC 4791) — works on macOS/Linux, and Windows with env/keyring auth. Supports event C...

      67Downloads
      0Installs
      0Stars
      1Versions
      Customer Support1,744Calendar & Scheduling1,462Networking & DNS1,102Cloud Storage1,005

      Security Analysis

      high confidence
      Clean

      This skill is internally consistent: it implements an Apple Calendar CalDAV CLI, only asks for an app-specific iCloud password (or keyring/keychain), and its files and runtime instructions match that purpose.

      Mar 4, 20264 files
      Purpose & Capabilityok

      Name/description, README, SKILL.md, and the included Python CLI implementation consistently describe a CalDAV-based iCloud calendar client. Required binary (python3), required env var (APPLECAL_PASSWORD), and optional keyring/keychain use are appropriate for the stated functionality.

      Instruction Scopeok

      Runtime instructions direct the agent to run the bundled Python script with Apple ID and (optionally) APPLECAL_PASSWORD or keyring-backed credentials. The script legitimately accesses local files only when performing attachment uploads, and it uses the macOS 'security' command only as a fallback to read Keychain — behavior that matches the README/notes. There are no instructions to read or exfiltrate unrelated files or credentials.

      Install Mechanismok

      No install spec in the registry (instruction-only skill) and the README asks the user to pip-install 'requests' (and optionally 'keyring'), which is proportional and expected. Nothing is downloaded from arbitrary URLs or extracted to disk by an installer.

      Credentialsok

      Only APPLECAL_PASSWORD is required (primary credential). The script optionally honors APPLECAL_ATTACH_DIR and may consult keyring or macOS Keychain; these are justified by the functionality. No unrelated service credentials or broad environment access are requested.

      Persistence & Privilegeok

      The skill is not force-included (always: false) and does not request elevated or persistent system-wide privileges. It uses local credential stores (keyring/Keychain) and respects an environment-var-based auth flow; it does not modify other skills or global agent configuration.

      Guidance

      This skill appears to be what it claims: a local Python CLI that manages your iCloud calendar over CalDAV. Before installing, consider the following: - You will need an Apple app-specific password (set APPLECAL_PASSWORD) or store credentials in keyring/Keychain; if you do not want the script to read Keychain, prefer the environment-variable option. - The script communicates with caldav.icloud.com and will transmit calendar data and any attachments you upload. Only attach files you trust. The code enforces an extension allowlist and blocks common sensitive paths/names, but no filter is perfect — consider setting APPLECAL_ATTACH_DIR to confine uploads to a dedicated folder. - The README asks you to pip install 'requests' (and optionally 'keyring'). Verify dependencies come from trusted sources and run installs in a controlled environment (virtualenv) if you prefer. - The code uses subprocess.run('security', ...) on macOS to read Keychain when APPLECAL_PASSWORD is not set; this behavior is expected but means the binary will call a system utility to retrieve credentials. - The skill is user-invocable and may be called by an autonomous agent (normal platform behavior). If you are cautious about autonomous operations, restrict agent permissions or only invoke the skill manually. If you want higher assurance, review the full scripts/applecal.py source (included) to confirm there are no hidden network endpoints or unexpected logging/exfiltration before use.

      Latest Release

      v1.3.0

      apple-cal-anywhere 1.3.0 - Adds support for managed attachments (RFC 8607), compatible with iPhone and iPad. - Enables querying multiple calendars in a single command for event listing. - Introduces free/busy lookup with event-derived fallback. - Enhances event update with options to explicitly clear location or description fields. - Improves attachment safety with allowlisted file extensions, sensitive path blocking, and optional directory scoping via APPLECAL_ATTACH_DIR. - Expands authentication fallback order and clarifies use of the APPLECAL_PASSWORD environment variable.

      Popular Skills

      self-improving-agent

      @pskoett · 1,456 stars

      Gog

      @steipete · 672 stars

      Tavily Web Search

      @arun-8687 · 620 stars

      Find Skills

      @JimLiuxinghai · 529 stars

      Proactive Agent

      @halthelobster · 426 stars

      Summarize

      @summarize · 415 stars

      Published by @xushen-ma on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]