unity-mcp
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/setup.shmodifies local configuration files for Claude, Codex, and Gemini CLI located in the user's home directory to register the MCP server. It uses Python snippets to programmatically edit these JSON and TOML files. - [EXTERNAL_DOWNLOADS]: The skill documentation directs users to install a Unity package from a third-party GitHub repository at
https://github.com/CoplayDev/unity-mcp.gitand usesnpxto fetch skill templates fromhttps://github.com/supercent-io/skills-template. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its ability to ingest untrusted data while possessing significant system capabilities. 1. Ingestion points: The
read_consoletool inSKILL.mdallows the agent to read potentially attacker-influenced Unity log output. 2. Boundary markers: No delimiters or instructions to ignore embedded commands are present in the documentation for log processing. 3. Capability inventory: The skill has access to high-privilege tools includingBash,Write,create_script, andexecute_custom_toolas defined inSKILL.md. 4. Sanitization: No sanitization or validation of the ingested console data is mentioned before the agent acts upon it.
Audit Metadata