process-clippings
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFEPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes web clippings, which are untrusted external data sources.
- Ingestion points: Untrusted data enters the context in
SKILL.mdvia the commandobsidian read path="Clippings/<file>.md"during the processing workflow. - Boundary markers: The instructions do not define clear delimiters or provide instructions to the agent to disregard any commands or directives embedded within the clipping text.
- Capability inventory: The skill uses the
Bashtool to perform file system operations, includingobsidian append,obsidian move, andobsidian deleteas defined inSKILL.mdsteps 2 and 3. - Sanitization: There is no evidence of sanitization, filtering, or validation of the content read from the clippings before it is processed or integrated into the destination files.
Audit Metadata