se-dev-server-code
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The
Prepare.batscript downloads an executable binary (busybox64u.exe) from an external third-party domain (https://frippery.org/files/busybox/busybox64u.exe) using PowerShell. - [REMOTE_CODE_EXECUTION]: The
Prepare.batscript executes a remote PowerShell script directly from the internet using theiex(Invoke-Expression) command (irm https://astral.sh/uv/install.ps1 | iex) to install theuvtool. - [COMMAND_EXECUTION]: The skill performs several high-privilege or sensitive command-line operations:
- Registry Access: Queries the Windows Registry (
reg query "HKEY_CURRENT_USER\Software\Valve\Steam") to discover local file paths. - Directory Junctions: Uses
mklink /Jto create directory junctions between the game installation and the skill folder. - Global Tool Installation: Executes
dotnet tool install --global ilspycmdto install software globally on the host system. - [DATA_EXPOSURE]: The
copy_content.pyandPrepare.batscripts access and duplicate local game data and metadata from the user's Steam installation directory for indexing purposes.
Audit Metadata