Skip to main content

cal-com-automation

Automates Cal.com scheduling tasks using Rube MCP, enabling efficient management of bookings, availability checks, and webhook configurations.

Install this skill

or
0/100

Security score

The cal-com-automation skill was audited on Feb 28, 2026 and we found 24 security issues across 2 threat categories. Review the findings below before installing.

Categories Tested

Security Issues

medium line 3

Webhook reference - potential data exfiltration

SourceSKILL.md
3description: "Automate Cal.com tasks via Rube MCP (Composio): manage bookings, check availability, configure webhooks, and handle teams. Always search tools first for current schemas."
medium line 83

Webhook reference - potential data exfiltration

SourceSKILL.md
83### 3. Configure Webhooks
medium line 85

Webhook reference - potential data exfiltration

SourceSKILL.md
85**When to use**: User wants to set up or manage webhook notifications for booking events
medium line 88

Webhook reference - potential data exfiltration

SourceSKILL.md
881. `CAL_RETRIEVE_WEBHOOKS_LIST` - List existing webhooks [Required]
medium line 89

Webhook reference - potential data exfiltration

SourceSKILL.md
892. `CAL_GET_WEBHOOK_BY_ID` - Get specific webhook details [Optional]
medium line 90

Webhook reference - potential data exfiltration

SourceSKILL.md
903. `CAL_UPDATE_WEBHOOK_BY_ID` - Update webhook configuration [Optional]
medium line 91

Webhook reference - potential data exfiltration

SourceSKILL.md
914. `CAL_DELETE_WEBHOOK_BY_ID` - Remove a webhook [Optional]
medium line 94

Webhook reference - potential data exfiltration

SourceSKILL.md
94- `id`: Webhook ID for GET/UPDATE/DELETE operations
medium line 95

Webhook reference - potential data exfiltration

SourceSKILL.md
95- `subscriberUrl`: Webhook endpoint URL
medium line 97

Webhook reference - potential data exfiltration

SourceSKILL.md
97- `active`: Whether the webhook is active
medium line 98

Webhook reference - potential data exfiltration

SourceSKILL.md
98- `secret`: Webhook signing secret
medium line 101

Webhook reference - potential data exfiltration

SourceSKILL.md
101- Webhook URLs must be publicly accessible HTTPS endpoints
medium line 103

Webhook reference - potential data exfiltration

SourceSKILL.md
103- Inactive webhooks do not fire; toggle `active` to enable/disable
medium line 104

Webhook reference - potential data exfiltration

SourceSKILL.md
104- Webhook secrets are used for payload signature verification
medium line 159

Webhook reference - potential data exfiltration

SourceSKILL.md
159### Webhook Setup
low line 162

Webhook reference - potential data exfiltration

SourceSKILL.md
1621. Call CAL_RETRIEVE_WEBHOOKS_LIST to check existing hooks
low line 163

Webhook reference - potential data exfiltration

SourceSKILL.md
1632. Create or update webhook with desired triggers
low line 164

Webhook reference - potential data exfiltration

SourceSKILL.md
1643. Verify webhook fires on test booking
medium line 182

Webhook reference - potential data exfiltration

SourceSKILL.md
182- Webhook management requires appropriate access level
medium line 196

Webhook reference - potential data exfiltration

SourceSKILL.md
196| List webhooks | CAL_RETRIEVE_WEBHOOKS_LIST | (none) |
medium line 197

Webhook reference - potential data exfiltration

SourceSKILL.md
197| Get webhook | CAL_GET_WEBHOOK_BY_ID | id |
medium line 198

Webhook reference - potential data exfiltration

SourceSKILL.md
198| Update webhook | CAL_UPDATE_WEBHOOK_BY_ID | id, subscriberUrl, eventTriggers |
medium line 199

Webhook reference - potential data exfiltration

SourceSKILL.md
199| Delete webhook | CAL_DELETE_WEBHOOK_BY_ID | id |
low line 21

External URL reference

SourceSKILL.md
21**Get Rube MCP**: Add `https://rube.app/mcp` as an MCP server in your client configuration. No API keys needed — just add the endpoint and it works.
Scanned on Feb 28, 2026
View Security Dashboard
Installation guide →