se-dev-mod
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
Prepare.batscript fetches theuvpackage manager installer fromastral.shand thebusyboxexecutable fromfrippery.org. Both are recognized as well-known and legitimate sources for development tools. - [REMOTE_CODE_EXECUTION]: The setup process involves executing a remote PowerShell script to install the
uvtool. This is a standard installation method for this utility. - [COMMAND_EXECUTION]: The
Prepare.batscript queries the Windows Registry keyHKEY_CURRENT_USER\Software\Valve\Steamto find the Steam installation path. - [COMMAND_EXECUTION]: The script uses the
mklink /Jcommand to create directory junctions for linking the game's mod folders to the skill's workspace. - [PROMPT_INJECTION]: The skill indexes and searches external C# mod code, which presents a surface for indirect prompt injection. Ingestion points: Mod source files found in
SteamMods/andLocalMods/directories. Boundary markers: There are no explicit markers used when presenting code search results to the agent. Capability inventory: The skill can execute shell commands via BusyBox and run Python scripts via theuvenvironment. Sanitization: Theindex_mods.pyandsearch_mods.pyscripts do not sanitize or escape the content of the indexed C# files before searching or displaying results.
Audit Metadata