se-dev-mod

Pass

Audited by Gen Agent Trust Hub on Feb 26, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The Prepare.bat script fetches the uv package manager installer from astral.sh and the busybox executable from frippery.org. Both are recognized as well-known and legitimate sources for development tools.
  • [REMOTE_CODE_EXECUTION]: The setup process involves executing a remote PowerShell script to install the uv tool. This is a standard installation method for this utility.
  • [COMMAND_EXECUTION]: The Prepare.bat script queries the Windows Registry key HKEY_CURRENT_USER\Software\Valve\Steam to find the Steam installation path.
  • [COMMAND_EXECUTION]: The script uses the mklink /J command to create directory junctions for linking the game's mod folders to the skill's workspace.
  • [PROMPT_INJECTION]: The skill indexes and searches external C# mod code, which presents a surface for indirect prompt injection. Ingestion points: Mod source files found in SteamMods/ and LocalMods/ directories. Boundary markers: There are no explicit markers used when presenting code search results to the agent. Capability inventory: The skill can execute shell commands via BusyBox and run Python scripts via the uv environment. Sanitization: The index_mods.py and search_mods.py scripts do not sanitize or escape the content of the indexed C# files before searching or displaying results.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 26, 2026, 07:11 PM