tentacle-obsidian-init
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes a Python script to scaffold the vault directory structure.
- Evidence:
scripts/init_vault.pyis invoked viauv runto copy assets fromassets/vault-scaffold/into the current working directory. - [REMOTE_CODE_EXECUTION]: The documentation within the skill includes instructions for installing environment prerequisites using piped shell scripts.
- Evidence:
assets/vault-scaffold/.agents/skills/AGENTS.mdprovides shell commands likecurl | bashfor installing well-known tools such as Homebrew and Bun. - [EXTERNAL_DOWNLOADS]: The skill references several external installers from well-known and trusted technology providers.
- Evidence: References include Homebrew (GitHub), Bun (bun.sh), and uv (astral.sh) for environment configuration.
- [PROMPT_INJECTION]: The skill establishes operational rules for AI agents through specific markdown files.
- Evidence:
AGENTS.mdfiles are designed to be read by AI agents to enforce folder conventions, naming standards, and execution rules within the vault workspace.
Audit Metadata