vault-setup
Pass
Audited by Gen Agent Trust Hub on Apr 6, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The
Tools/VaultBuilder.pyscript uses thesubprocess.runandos.startfilefunctions to open the Obsidian application via URI schemes and check for running processes. These operations are cross-platform and are used strictly for vault management and verification. - [COMMAND_EXECUTION]: The skill executes shell commands in
Workflows/Setup.mdto create the vault's folder structure, establish symlinks for companion skills, and open the vault directory in Obsidian. - [SAFE]: The skill modifies the
~/.claude/CLAUDE.mdfile through theinject-globalcommand inTools/VaultBuilder.py. This is a persistence mechanism used to load the vault's context into the agent globally, which is a standard configuration for this platform and is explicitly presented to the user as an optional choice. - [SAFE]: The
scripts/process_docs_to_obsidian.pyscript facilitates the ingestion of external documents into the vault. While this creates a surface for indirect prompt injection if the imported files contain malicious instructions, the script itself only performs file copying and metadata addition without executing or interpreting the file content.
Audit Metadata