Obsidian plugin was abused to deploy a remote access trojan

Nature of the attack

  • Attack uses a shared Obsidian vault that already includes malicious community plugins, plus social engineering to:
    • Get the victim to enable community plugins.
    • Enable syncing of plugins from the shared vault.
  • Plugins then deploy a RAT; no evidence in the thread of a popular existing plugin being taken over.
  • Several commenters stress this is a social-engineering campaign rather than an exploit of a specific code vulnerability.

Obsidian’s current plugin security model

  • Community plugins run with effectively full access: can read/write files, access the network, and spawn programs.
  • This behavior is documented in Obsidian’s own security help, which some see as honest disclosure, others as “negligent by design.”
  • Plugins are not auto‑updated, but a malicious update to a popular plugin is seen as a high‑risk scenario.

Responsibility: user behavior vs platform design

  • One side: Obsidian has “proper protections”; the attack required users to override explicit warnings, analogous to running any untrusted software.
  • Other side: putting powerful, unsandboxed plugins behind easily dismissible warnings is called bad engineering, especially for a mainstream note app.
  • Debate over whether this makes Obsidian inappropriate for enterprise use; some call using it there “malpractice,” others say any app can be abused if users disable safeguards.

Sandboxing and permission ideas

  • Strong support for:
    • Granular permissions (filesystem, network, external programs) similar to Android/iOS.
    • Sandboxed plugin runtimes (e.g., WASM/WASI, Lua, or OS-level isolation).
    • Forcing plugins to declare network endpoints and capabilities upfront.
  • Counterpoints:
    • Proper sandboxing is hard and costly.
    • Many powerful plugins legitimately need broad access.
    • Over-restricting would “neuter” the ecosystem and user power.

Plugins: essential or optional?

  • Split opinions:
    • Some say Obsidian is unusable for serious workflows without community plugins.
    • Others happily run “vanilla” or only official/core plugins and view third‑party plugins as unnecessary risk or bloat.
  • Several users sandbox Obsidian at the OS level or only use self‑written / audited plugins.

Project response and future direction

  • A major plugin-security update is announced as “coming soon.”
  • Some commenters are skeptical, arguing concerns were raised years ago; others remain confident in the app but want more batteries‑included features plus enforced permissions.