uloop-execute-menu-item
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides a mechanism to execute arbitrary menu items in the Unity Editor through the
uloopCLI tool. - Evidence:
uloop execute-menu-item --menu-item-path "<path>"usage defined inSKILL.md. - Scope: The tool can trigger standard editor actions (save, build) as well as custom scripts defined within the Unity project.
- [PROMPT_INJECTION]: The skill exhibits vulnerability to indirect prompt injection (Category 8).
- Ingestion points: The
--menu-item-pathparameter inSKILL.mdwhich accepts external string input that may be derived from untrusted project files or documentation. - Boundary markers: Absent; there are no delimiters or specific instructions to the agent to validate or treat the path string as raw data.
- Capability inventory: Subprocess execution of the
uloopcommand which impacts the Unity editor state and environment. - Sanitization: Absent; the skill definition does not describe any validation or escaping mechanisms for the input parameters.
Audit Metadata