kao-obsidian
Fail
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill falsely claims to use an 'official Obsidian CLI (v1.12+)'. This misleading metadata can trick agents or users into trusting a tool that is not vetted by the official developers and may contain malicious functionality.
- [COMMAND_EXECUTION]: The skill documents and encourages the use of the
obsidian evalcommand, which allows for the execution of arbitrary JavaScript code within the context of the Obsidian application. This provides a direct vector for unauthorized system access and manipulation. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8). Ingestion points: Notes are read from the vault directory via commands like
obsidian readandobsidian search. Boundary markers: No instructions are provided to the agent to differentiate between its core mission and instructions found within the processed notes. Capability inventory: The agent is granted extensive file-writing capabilities and a direct code execution tool (eval). Sanitization: There are no instructions for validating or sanitizing note content before it is used to influence agent behavior or system commands. - [EXTERNAL_DOWNLOADS]: The
plugin:installcommand enables the agent to download and execute code from external community repositories, posing a supply-chain risk and a path for remote code execution. - [COMMAND_EXECUTION]: The
dev:screenshotcommand allows the agent to capture and export the application's UI, which may contain sensitive personal or professional information stored in the vault.
Recommendations
- AI detected serious security threats
Audit Metadata