obsidian-course-vault
Pass
Audited by Gen Agent Trust Hub on May 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/maintain_obsidian_course.pyusessubprocess.runto execute Python scripts (collect_buaa_course_replays.pyandextract_buaa_classroom.py) located in a neighboring skill directory (buaa-classroom-summarizer). The commands are passed as lists, which is a secure practice to prevent shell injection. This execution is part of the intended multi-skill workflow for processing course replays. - [DATA_PROCESSING_SURFACE]: The skill facilitates the reconstruction of course notes from untrusted external transcripts, presenting an indirect prompt injection surface.
- Ingestion points: External transcripts and metadata are ingested in
scripts/maintain_obsidian_course.pyandscripts/review_final_note.pyto generate note packets. - Boundary markers: The
SKILL.mddefines a strict 'Authoring Contract' and uses a generatedsemantic_rebuild_prompt.mdto scope the agent's behavior during reconstruction. - Capability inventory: The skill has the capability to write Markdown files to the local Obsidian vault and execute local maintenance scripts.
- Sanitization: The skill includes a dedicated validation script
scripts/validate_final_note.pythat checks for internal markers, generic boilerplate, and malformed timestamps, effectively gating low-quality or potentially poisoned outputs. - [EXTERNAL_DOWNLOADS]: The skill interacts with external course replay systems via secondary scripts to fetch academic content. This is the primary functional purpose of the tool and is handled through structured data exchange.
Audit Metadata