balatro-mod-dev
Warn
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill grants the agent extensive shell access through its sub-agent architecture. The
script-runnerandcode-writeragents are equipped with theBashtool to execute temporary scripts and perform system-level development tasks such as syncing mods and creating releases. Additionally,SKILL.mdcontains bash scripts for repository analysis usinggitandjqcommands. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because several research agents, including
mod-pattern-researcherandlovely-patch-researcher, are instructed to read and summarize content from the user'sMods/directory and third-party configuration files. Maliciously crafted content in these external files could influence the agent's logic or lead to the generation of unsafe code. - Ingestion points: Specialists such as
mod-pattern-researcherandlovely-patch-researcheringest data from local third-party mod files andlovely.tomlpatches as described inreferences/sub-agents.md. - Boundary markers: The agent uses XML-style tags like
<objective>,<task>, and<prior_findings>to delineate instructions, which provides some structural separation but is not a complete defense against adversarial content. - Capability inventory: The
code-writersub-agent hasWrite,Edit, andBashcapabilities, and thescript-runnerhasBashaccess, creating a vector for injected instructions to affect the local file system or execute code. - Sanitization: The skill lacks explicit sanitization or instructions to ignore potential directives embedded in the searched codebases or third-party mod files.
Audit Metadata