go-game-dev
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/build_all.pyscript uses thesubprocessmodule to executego buildcommands for multi-platform compilation. Furthermore,references/vfx_guide.mdinvolves runtime compilation of Kage shading language code throughebiten.NewShaderfor visual effects. - [PROMPT_INJECTION]: A vulnerability surface for indirect prompt injection (Category 8) exists due to the skill's role in analyzing user-provided code while maintaining access to execution tools.
- Ingestion points: User-supplied Go source code and game design specifications provided during the interaction.
- Boundary markers: No specific delimiters or instructions are used to separate user data from system commands.
- Capability inventory: Access to the
scripts/build_all.pycommand execution script. - Sanitization: Lack of input validation or sanitization for code snippets before processing.
- [EXTERNAL_DOWNLOADS]: The skill references standard Go libraries and tools such as Ebitengine, Raylib-go,
gomobile, and Steam integration libraries. These are well-recognized resources in the development community.
Audit Metadata