vault-structure-sync

Pass

Audited by Gen Agent Trust Hub on Mar 11, 2026

Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [SAFE]: No malicious patterns were detected. The skill performs legitimate IDE project configuration management based on user-provided directory structures.
  • [COMMAND_EXECUTION]: The skill requires Bash tool access to automate file system tasks, such as creating IDEA module files (.iml) and updating the project's modules configuration. This is necessary for the stated functionality.
  • [DATA_EXFILTRATION]: The skill accesses the .obsidian and .idea configuration directories to synchronize settings. These operations are local and no external network communication or data exfiltration attempts were identified.
  • [PROMPT_INJECTION]: The skill has a surface for indirect prompt injection because it processes folder names from the vault to generate configuration files.
  • Ingestion points: Folder names matching /^\d{2}_/ (SKILL.md).
  • Boundary markers: No delimiters are specified to isolate folder names during XML generation.
  • Capability inventory: The skill uses 'Read', 'Write', and 'Bash' tools (meta.json).
  • Sanitization: No sanitization of folder names is mentioned before they are incorporated into configuration files.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 11, 2026, 03:40 AM