obsidian-bases
Warn
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill processes metadata and properties from Obsidian vault notes which are untrusted data sources.
- Ingestion points: Note properties and frontmatter are accessed via
file.propertiesandnote.authoras seen inSKILL.md. - Boundary markers: There are no explicit instructions or delimiters used to prevent the agent from treating data within note properties as instructions.
- Capability inventory: The skill generates
.basefiles which can execute logic via formulas and render UI elements. - Sanitization: Although
escapeHTML()is available, its use is not required or emphasized in the recommended workflow for processing external note data. - [COMMAND_EXECUTION]: The skill provides a mechanism for dynamic UI-side code execution through its formula system and HTML rendering capability.
- Evidence: The
html()function documented inreferences/FUNCTIONS_REFERENCE.mdallows raw strings to be rendered as HTML within the Obsidian interface. If note properties containing malicious scripts are passed to this function, it could lead to arbitrary script execution in the context of the Obsidian application.
Audit Metadata