obsidian-learning-path
Fail
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/vault_bridge.pycontains a critical command injection vulnerability in theupdate_properties_clifunction. It utilizessubprocess.runwithshell=Trueon a command string constructed via f-strings. This string incorporates thefile_nameand propertyvaluevariables without any sanitization. An attacker who can control note titles or frontmatter values in a processed Obsidian vault could execute arbitrary shell commands on the host system. - [DATA_EXFILTRATION]: The skill implements automated scanning of local Obsidian vaults via
scripts/vault_bridge.pyandscripts/pkg_gkg_diff.py. This process ingests untrusted data from Markdown frontmatter into analytics YAML files that are then injected into the agent's context. This creates a surface for indirect prompt injection, where malicious instructions hidden in a vault could influence the agent's behavior. Additionally, sensitive data extracted during these scans could be inadvertently exposed in the agent's context or sent via the integratedob synccommand. - [EXTERNAL_DOWNLOADS]: The skill depends on external CLI tools such as
obsidian,ob(obsidian-headless), andobsidian-vault-manager. While these are documented as part of the Obsidian integration ecosystem, their execution involves network synchronization and the potential for remote data transmission to the Obsidian Sync service.
Recommendations
- AI detected serious security threats
Audit Metadata