plugins-themes
Fail
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the Bash tool to execute system commands through the
obsidianCLI, allowing for interaction with the local environment. - [REMOTE_CODE_EXECUTION]: The
obsidian evalcommand allows for the execution of arbitrary JavaScript code within the Obsidian application context. This provides a direct path for an attacker to execute malicious logic if the agent processes untrusted input into thecodeparameter. - [DYNAMIC_EXECUTION]: The skill facilitates the assembly and execution of JavaScript code at runtime via
obsidian eval code="...". This is a high-risk functionality that can be used to bypass security controls or access sensitive data within the Obsidian vault (e.g., usingapp.vault.read()). - [DATA_EXPOSURE]: The
obsidian dev:screenshotcommand allows the agent to capture images of the Obsidian application window. If sensitive documents are open in the vault, this capability can be used to extract visual information without explicit user consent for each capture.
Recommendations
- AI detected serious security threats
Audit Metadata