tasks
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to executeobsidianCLI commands. User input is placed directly into shell arguments (e.g.,content="...",file="..."). If the input contains shell metacharacters like backticks, semicolons, or pipes, it could lead to arbitrary command execution on the host system. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. 1. Ingestion points: Untrusted data enters the agent context via the
content,file, andtaskparameters inSKILL.md. 2. Boundary markers: The templates lack boundary markers or instructions to ignore embedded commands within the user input. 3. Capability inventory: The skill has access to powerful tools includingBash,Read,Grep, andGlobacross all commands inSKILL.md. 4. Sanitization: There is no evidence of sanitization or escaping of special characters before the data is passed to the shell environment.
Audit Metadata