godot-devtool-mcp-server
Warn
Audited by Gen Agent Trust Hub on May 18, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The installation guide instructs users to clone a repository from an unverified GitHub account (wangdiandao/godot-devtool.git), which does not match the vendor Aradotso.
- [REMOTE_CODE_EXECUTION]: The skill provides tools like
script_writeto create arbitrary GDScript files andrun_projectto execute them, which enables arbitrary code execution within the Godot runtime environment. - [COMMAND_EXECUTION]: The
run_projectand various 'headless' tools execute the Godot engine binary on the host system with parameters that can be influenced by the AI or project files. - [DATA_EXFILTRATION]: The
browser_visualizer_starttool launches a local HTTP server on a specified port, which could potentially expose local project data or system information if the network configuration allows external access. - [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection by reading project settings, scenes, and scripts from potentially untrusted projects.
- Ingestion points: Reads Godot project files, GDScripts, and scene trees (e.g., in
script_read,scene_tree_inspect). - Boundary markers: None mentioned.
- Capability inventory:
script_write(file write),run_project(process execution),browser_visualizer_start(network socket). - Sanitization: None specified for file content processing.
Audit Metadata