obsidian
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Data Exposure (HIGH): The skill instructions direct the agent to read sensitive configuration data from
~/Library/Application Support/obsidian/obsidian.json. This file contains metadata and absolute paths for all vaults, which could be exploited if the agent is compromised.- Unverifiable Dependencies (MEDIUM): The installation instructions utilize a third-party Homebrew tap (yakitrak/yakitrak/obsidian-cli). This source is not within the defined trusted organizations or repositories, posing a supply chain risk.- Indirect Prompt Injection (HIGH): The skill possesses a significant vulnerability surface where malicious instructions embedded in Obsidian notes can influence agent behavior. - Ingestion points: Content is ingested via
obsidian-cli search-contentand direct reading of.mdfiles. - Boundary markers: There are no boundary markers or instructions to treat note content as untrusted data.
- Capability inventory: The skill provides the ability to
create,move, anddeletefiles, as well as perform direct edits. - Sanitization: No sanitization or validation of the note content is performed before processing.
Recommendations
- AI detected serious security threats
Audit Metadata