siyuan-notes
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection (Category 8) due to the ingestion of untrusted data from user notes.
- Ingestion points: User-generated note content is retrieved via
searchNotes,getBlockByID, andexecuteSiyuanQueryinindex.jsand returned to the agent context. - Boundary markers: The skill does not implement delimiters or 'ignore embedded instructions' warnings when presenting note content to the agent.
- Capability inventory: The skill has network access via
node-fetchand local file system access (read/write/delete) in the.tmpdirectory via thefsmodule. - Sanitization: Minimal sanitization is performed (e.g., basic HTML tag removal in
searchNotes), but no filtering exists to prevent embedded instructions in the notes from influencing the LLM. - [COMMAND_EXECUTION]: The skill allows the agent to execute arbitrary SQL statements on the Siyuan Note database.
- Evidence: The
executeSiyuanQueryfunction inindex.jstakes a raw SQL string and passes it directly to the Siyuan API's/api/query/sqlendpoint. While intended for querying, this represents a high-privilege interface to the note database. - [EXTERNAL_DOWNLOADS]: The skill fetches data and assets from external or local network sources.
- Evidence: It communicates with a Siyuan Note server via HTTP/HTTPS. The
getLocalAssetPathfunction inindex.jsdownloads binary assets (images, attachments) from the note server and stores them in a local.tmp/assetsdirectory for agent processing.
Audit Metadata