unity-so-prefab-manager
Warn
Audited by Gen Agent Trust Hub on Feb 14, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [Indirect Prompt Injection] (MEDIUM): The skill is designed to ingest and process untrusted external data (Unity project files like .asset, .prefab, and .meta) while possessing significant write capabilities.
- Ingestion points: Uses
grep_searchand file reading to analyze existing project assets (mentioned inSKILL.mdunder 'Surgical YAML'). - Boundary markers: None identified; the instructions do not specify delimiters to separate untrusted file content from the agent's internal logic.
- Capability inventory: Possesses
write_to_file,replace_file_content, andmcp_unityMCP_refresh_unityfor modifying the project state and triggering asset registration. - Sanitization: No evidence of sanitization or validation of the content read from files before it is used to inform further
replace_file_contentoperations. - [Command Execution] (MEDIUM): The 'Surgical YAML' workflow encourages project-wide
replace_file_contentbased on search results. If the agent is misled by malicious data in a project file, it could be coerced into corrupting the project or injecting malicious scripts into C# source files. - [Dynamic Execution] (LOW): The 'Performance' workflow involves the agent manually constructing and writing Unity YAML files (
.asset) to bypass the standard API. While common for bulk operations, this bypasses any validation logic inherent in the higher-level Unity API tools.
Audit Metadata