godot-autoload-architecture

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFE
Full Analysis
  • Prompt Injection (SAFE): No instructions found that attempt to bypass safety filters or override system prompts. Instructional keywords like 'MANDATORY' are used within the context of the technical guide.
  • Data Exposure & Exfiltration (SAFE): No hardcoded credentials, sensitive file path access, or unauthorized network operations detected.
  • Obfuscation (SAFE): No encoded strings, zero-width characters, or homoglyphs identified in the documentation or code snippets.
  • Unverifiable Dependencies & Remote Code Execution (SAFE): The skill references internal project scripts (e.g., 'scripts/service_locator.gd') but does not perform remote downloads or execute untrusted code.
  • Privilege Escalation (SAFE): No commands related to administrative access or permission modification were found.
  • Persistence Mechanisms (SAFE): No attempts to modify shell profiles, startup scripts, or registry keys detected.
  • Metadata Poisoning (SAFE): The metadata accurately describes the skill's technical purpose without deceptive content.
  • Indirect Prompt Injection (SAFE): The skill does not process external untrusted data; it provides static architectural patterns.
  • Time-Delayed / Conditional Attacks (SAFE): No logic found that triggers behavior based on time or external conditions.
  • Dynamic Execution (SAFE): Uses standard Godot functions ('preload', 'instantiate') for local asset management; no unsafe dynamic code execution or deserialization patterns found.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:07 PM