se-dev-game-code
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
Prepare.batscript fetches theuvinstaller from Astral and thebusybox.exeexecutable from Frippery. These are well-known services for developer tooling and system utilities. - [COMMAND_EXECUTION]: The skill uses structured
subprocess.runcalls and standard batch scripts to orchestrate the decompilation and indexing process usinggit,dotnet, andilspycmd. These operations are consistent with the skill's primary purpose. - [PROMPT_INJECTION]: The skill processes decompiled C# code originating from external game binaries, which acts as a surface for indirect prompt injection.
- Ingestion points: Decompiled source files read by
search_game_code.py. - Boundary markers: Data is presented to the agent as search results within a code-exploration context.
- Capability inventory: Includes file read, network download (during setup), and local execution of indexing scripts.
- Sanitization: Content is treated as raw source code for analysis purposes.
Audit Metadata