obsidian-cron
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides templates and instructions for executing shell commands and system-level scheduling operations.
- Evidence:
references/system-schedulers.mdcontains Bash script skeletons and macOSlaunchdplist configurations (com.obsidian.morning-routine.plist) to automate tasks. - Evidence:
SKILL.mddescribes the use ofobsidian evalto execute arbitrary code within the Obsidian environment. - [DATA_EXFILTRATION]: The skill includes patterns for extracting vault data and writing it to external local storage.
- Evidence:
references/job-recipes.mdandSKILL.mdprovide examples of exporting search results to JSON files in the user's home directory (e.g.,~/tmp/active_notes.json). - [PROMPT_INJECTION]: The skill creates an indirect prompt injection surface by instructing the agent to ingest and process potentially untrusted content from Obsidian vaults.
- Ingestion points: Vault content is read via
obsidian searchandobsidian dailycommands as seen inreferences/job-recipes.mdandSKILL.md. - Boundary markers: Absent; there are no instructions provided to separate or ignore potentially malicious instructions embedded within notes.
- Capability inventory: The agent can execute shell scripts, write files, and interact with system schedulers (
launchctl,crontab). - Sanitization: Absent; no validation or escaping of vault content is suggested before it is processed or exported.
Audit Metadata