se-dev-game-code

Pass

Audited by Gen Agent Trust Hub on May 9, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The Prepare.bat script fetches the uv installer from Astral and the busybox.exe executable from Frippery. These are well-known services for developer tooling and system utilities.
  • [COMMAND_EXECUTION]: The skill uses structured subprocess.run calls and standard batch scripts to orchestrate the decompilation and indexing process using git, dotnet, and ilspycmd. These operations are consistent with the skill's primary purpose.
  • [PROMPT_INJECTION]: The skill processes decompiled C# code originating from external game binaries, which acts as a surface for indirect prompt injection.
  • Ingestion points: Decompiled source files read by search_game_code.py.
  • Boundary markers: Data is presented to the agent as search results within a code-exploration context.
  • Capability inventory: Includes file read, network download (during setup), and local execution of indexing scripts.
  • Sanitization: Content is treated as raw source code for analysis purposes.
Audit Metadata
Risk Level
SAFE
Analyzed
May 9, 2026, 09:09 PM