wiki-query
Pass
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
Greptool to search for specific frontmatter fields (title, tags, aliases, summary) and section content within Markdown files in the configured vault path. This is used to build candidate sets and extract relevant context without reading entire files.\n- [PROMPT_INJECTION]: As a retrieval-based skill, it is subject to indirect prompt injection from the content it processes. \n - Ingestion points: Reads
index.md,hot.md, and arbitrary page bodies from the Obsidian vault directory.\n - Boundary markers: None identified; wiki content is synthesized directly into answers.\n
- Capability inventory: Performs file searches with
Grep, reads file content withRead, and appends query logs tolog.md.\n - Sanitization: None identified; the agent relies on its own synthesis logic to interpret retrieved data.\n- [SAFE]: The skill accesses local configuration files including
.envand~/.obsidian-wiki/configto determine theOBSIDIAN_VAULT_PATH. This is standard initialization for a local knowledge-base tool and does not involve the exfiltration of credentials or sensitive data to external sources.
Audit Metadata