obsidian-markdown

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOW
Full Analysis
  • [SAFE] (INFO): The analyzed files consist entirely of Markdown-based documentation and templates for the Obsidian application. No malicious patterns, obfuscation, or unauthorized access attempts were found.\n- [COMMAND_EXECUTION] (LOW): The references/templater-commands.md file documents standard features of the Templater plugin, including JavaScript execution blocks (<%* ... %>) and system-level interactions like clipboard access and user prompts. While powerful, these are documented as legitimate local automation features of the Obsidian environment.\n- [REMOTE_CODE_EXECUTION] (LOW): Documentation in references/templater-commands.md mentions functions like tp.web.daily_quote() which fetch content from external sources. These are standard, verifiable plugin features for content aggregation and do not represent unauthorized remote execution in the context of this skill.\n- [DATA_EXFILTRATION] (LOW): Access to file properties and frontmatter metadata via Dataview and Templater is documented for the purpose of vault organization and querying. No patterns for exfiltrating this data to external servers were detected.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 07:30 AM