obsidian-vault-manager
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The script
scripts/convert_zhcn_to_zhtw.pyis configured to automatically install theopencc-python-reimplemented==0.1.7package from an external registry usingpiporuvif the dependency is missing. Runtime installation of third-party packages without prior security verification introduces a supply chain risk. - [COMMAND_EXECUTION]: The skill reference
references/obsidian-cli.mdexplicitly documents how to use sensitive commands such aseval code=<javascript>anddev:cdp. These commands enable arbitrary code execution and deep inspection of the Obsidian application environment, posing a significant risk if the agent is manipulated into running them. - [PROMPT_INJECTION]: The skill is designed to ingest and analyze untrusted user-controlled data (markdown notes) from the Obsidian vault. This provides a vector for indirect prompt injection, where malicious content within a note could override the agent's instructions during summarization or knowledge extraction tasks.
- Ingestion points: Note contents are read and processed for health checks and knowledge extraction as described in
references/knowledge-management.md. - Boundary markers: No specific delimiters or safety instructions for handling user data were identified in the scripts or prompts.
- Capability inventory: The agent has capabilities to modify files, delete content, and execute Obsidian CLI commands (including
eval). - Sanitization: There is no evidence of sanitization or filtering of the content retrieved from vault notes before it is analyzed by the agent.
Audit Metadata