obsidian-base-create

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
  • [COMMAND_EXECUTION]: The skill uses bash commands like grep, sort, and uniq to scan the user's Obsidian vault for existing metadata properties. This allows the agent to build accurate filters based on the user's actual data without manual property entry.\n- [COMMAND_EXECUTION]: It executes a python3 command to validate the syntax of the generated .base YAML files. The use of yaml.safe_load ensures that the validation process does not execute arbitrary code if the YAML content is malformed or contains malicious tags.\n- [SAFE]: All operations are restricted to the local environment and the specified vault path. There are no network requests, remote script downloads, or attempts to access sensitive system directories outside the Obsidian vault.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 03:34 AM