flame-game-dev
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFE
Full Analysis
- [Prompt Injection] (SAFE): The skill contains purely instructional content for game development. No attempts to override system prompts or bypass safety filters were found.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials or sensitive file paths (like SSH keys or AWS configs) are present. Placeholders like
<password>are used in documentation for app signing, which is standard practice. Network code for multiplayer and cloud saves uses standard WebSockets and Firebase APIs with no unauthorized data transmission. - [Obfuscation] (SAFE): All markdown and code snippets are clear and human-readable. No Base64, zero-width characters, or homoglyphs were detected.
- [Unverifiable Dependencies & Remote Code Execution] (SAFE): The skill references well-known and trusted Flutter packages such as
flame,flame_audio,flame_tiled, andsteamworks. No piped bash execution or remote script downloading was found. - [Privilege Escalation] (SAFE): No usage of
sudo,chmod 777, or other privilege-escalation commands was found. Build commands likeflutter buildare standard for the development domain. - [Persistence Mechanisms] (SAFE): The skill does not contain any commands that modify system startup, shell profiles, or scheduled tasks.
- [Dynamic Execution] (SAFE): Code examples use
jsonDecodefor handling game data, which is a safe way to parse structured data in Dart. No unsafe deserialization (e.g.,pickle) oreval()patterns were present.
Audit Metadata