سجل التدقيق
knowledge-base - 5 عمليات التدقيق
إصدار التدقيق 5
الأحدث مخاطر منخفضةJan 17, 2026, 04:41 AM
This is a legitimate knowledge base documentation tool. All static findings are false positives: child_process exec is imported but never used; backticks are JavaScript template literals for documentation generation, not shell execution; path traversal warnings are mitigated by explicit sanitization (lines 217, 225); hidden files are explicitly skipped (lines 149, 194, 288, 357, 423, 473); all operations scoped to project-local docs/knowledge directory with no network calls or credential access.
عوامل الخطر
📁 الوصول إلى نظام الملفات (4)
إصدار التدقيق 4
مخاطر منخفضةJan 17, 2026, 04:41 AM
This is a legitimate knowledge base documentation tool. All static findings are false positives: child_process exec is imported but never used; backticks are JavaScript template literals for documentation generation, not shell execution; path traversal warnings are mitigated by explicit sanitization (lines 217, 225); hidden files are explicitly skipped (lines 149, 194, 288, 357, 423, 473); all operations scoped to project-local docs/knowledge directory with no network calls or credential access.
عوامل الخطر
📁 الوصول إلى نظام الملفات (4)
إصدار التدقيق 3
مخاطر منخفضةJan 10, 2026, 02:27 PM
This is a legitimate knowledge base management tool with filesystem operations scoped to the project-local docs/knowledge directory. Imports exec from child_process but never uses it. No network calls, no credential access, and behavior matches stated purpose.
عوامل الخطر
📁 الوصول إلى نظام الملفات (4)
إصدار التدقيق 2
مخاطر منخفضةJan 10, 2026, 02:27 PM
This is a legitimate knowledge base management tool with filesystem operations scoped to the project-local docs/knowledge directory. Imports exec from child_process but never uses it. No network calls, no credential access, and behavior matches stated purpose.
عوامل الخطر
📁 الوصول إلى نظام الملفات (4)
إصدار التدقيق 1
مخاطر منخفضةJan 10, 2026, 02:27 PM
This is a legitimate knowledge base management tool with filesystem operations scoped to the project-local docs/knowledge directory. Imports exec from child_process but never uses it. No network calls, no credential access, and behavior matches stated purpose.