wiki
Fail
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill interpolates user-supplied arguments and content-derived strings directly into shell commands without sanitization. This occurs in the
initandremoveoperations (using the<name>argument), thequeryoperation (using the<question>argument), and thecompileoperation (using extracted article titles in agrepcommand). This pattern is highly susceptible to shell command injection if the inputs contain shell metacharacters. - [REMOTE_CODE_EXECUTION]: The
lintoperation executes an external Python script (scripts/lint-wiki.py) located in the plugin root. This script is not provided within the skill's source files, creating a dependency on an external or environment-provided executable. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection (Category 8).
- Ingestion points: Data enters via the
ingest <path|url>command which reads from external URLs or local files. - Boundary markers: No explicit boundary markers or directives are used to separate ingested content from the agent's instructions during processing.
- Capability inventory: The agent has access to file system writes (
mkdir,git, file writes in~/ObsidianVault), shell execution (grep,qmd,marp,python3), and network access (WebFetch). - Sanitization: No evidence of sanitization for ingested content before it is processed by the LLM for summarization and entity extraction.
- [DATA_EXFILTRATION]: The
ingestcommand allows fetching content from arbitrary URLs via theWebFetchtool. This capability could be abused to probe internal network services or exfiltrate data if the agent is directed to ingest from sensitive locations.
Recommendations
- AI detected serious security threats
Audit Metadata