Skip to main content

alttp-disasm-labels

Interprets Link to the Past disassembly for accurate mapping of ROM addresses to labels and routines, enhancing debugging and development.

Install this skill

or
70/100

Security score

The alttp-disasm-labels skill was audited on May 12, 2026 and we found 6 security issues across 1 threat category. Review the findings below before installing.

Categories Tested

Security Issues

medium line 31

Access to hidden dotfiles in home directory

SourceSKILL.md
31- Bank-by-bank reference: `~/.context/knowledge/hobby/usdasm.md`
medium line 32

Access to hidden dotfiles in home directory

SourceSKILL.md
32- Game architecture (modules, NMI, state machines): `~/.context/knowledge/alttp/architecture.md`
medium line 33

Access to hidden dotfiles in home directory

SourceSKILL.md
33- Key routines by domain: `~/.context/knowledge/alttp/routine_index.md`
medium line 34

Access to hidden dotfiles in home directory

SourceSKILL.md
34- ROM data table locations: `~/.context/knowledge/alttp/data_tables.md`
medium line 35

Access to hidden dotfiles in home directory

SourceSKILL.md
35- Vanilla sprite catalog (243 types): `~/.context/knowledge/alttp/sprite_catalog.md`
medium line 36

Access to hidden dotfiles in home directory

SourceSKILL.md
36- SNES CPU & memory map: `~/.context/knowledge/snes/cpu_memory.md`
Scanned on May 12, 2026
View Security Dashboard
Installation guide →
Rate this skill
Categorydevelopment
UpdatedMay 13, 2026
scawful/afs_scawful