obsidian-cli
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- Dynamic Execution (HIGH): The skill documents the command
obsidian eval code="..."inSKILL.md. This allows for the execution of arbitrary JavaScript within the Obsidian application context. Since Obsidian is an Electron app, this capability could be used to execute system commands or access the file system beyond the vault's scope. - Privilege Escalation (HIGH): The
references/headless-setup.mdfile contains instructions usingsudoto remove snaps and install deb packages (sudo dpkg -i obsidian_1.11.7_amd64.deb). Requesting that an agent or user run commands with root privileges is a high-risk pattern. - External Downloads (MEDIUM): The setup instructions perform a remote download of a binary package using
wgetfrom a GitHub repository (obsidianmd/obsidian-releases). While GitHub is a known platform, the specific organization is not on the trusted list, and binary installation via shell scripts is a common attack vector. - Indirect Prompt Injection (LOW): The skill is designed to read untrusted data from Obsidian notes via commands like
obsidian readandobsidian search. - Ingestion points: Files read from the Obsidian vault.
- Boundary markers: None identified; note content is processed directly.
- Capability inventory: File modification (
obsidian create,obsidian append), plugin management, and arbitrary JS execution (obsidian eval). - Sanitization: No evidence of sanitization or instruction filtering for note content.
Recommendations
- AI detected serious security threats
Audit Metadata