سجل التدقيق
get-available-resources - 5 عمليات التدقيق
إصدار التدقيق 5
الأحدث مخاطر منخفضةJan 17, 2026, 07:36 AM
The skill is safe to publish. All 50 static findings are false positives. The skill performs legitimate system resource detection using subprocess calls to standard system utilities (nvidia-smi, rocm-smi, sysctl, system_profiler) for GPU/CPU detection. All subprocess commands use hardcoded arguments in list format, preventing shell injection. The __import__ usage is for importing the standard datetime module. Markdown backticks triggered false positives for shell execution. 'Weak cryptographic algorithm' findings are scanner errors on non-cryptographic code.
مشكلات منخفضة المخاطر (1)
عوامل الخطر
⚙️ الأوامر الخارجية (4)
⚡ يحتوي على سكربتات (1)
📁 الوصول إلى نظام الملفات (1)
إصدار التدقيق 4
مخاطر منخفضةJan 17, 2026, 07:36 AM
The skill is safe to publish. All 50 static findings are false positives. The skill performs legitimate system resource detection using subprocess calls to standard system utilities (nvidia-smi, rocm-smi, sysctl, system_profiler) for GPU/CPU detection. All subprocess commands use hardcoded arguments in list format, preventing shell injection. The __import__ usage is for importing the standard datetime module. Markdown backticks triggered false positives for shell execution. 'Weak cryptographic algorithm' findings are scanner errors on non-cryptographic code.
مشكلات منخفضة المخاطر (1)
عوامل الخطر
⚙️ الأوامر الخارجية (4)
⚡ يحتوي على سكربتات (1)
📁 الوصول إلى نظام الملفات (1)
إصدار التدقيق 3
مخاطر منخفضةJan 17, 2026, 07:36 AM
The skill is safe to publish. All 50 static findings are false positives. The skill performs legitimate system resource detection using subprocess calls to standard system utilities (nvidia-smi, rocm-smi, sysctl, system_profiler) for GPU/CPU detection. All subprocess commands use hardcoded arguments in list format, preventing shell injection. The __import__ usage is for importing the standard datetime module. Markdown backticks triggered false positives for shell execution. 'Weak cryptographic algorithm' findings are scanner errors on non-cryptographic code.
عوامل الخطر
⚙️ الأوامر الخارجية (4)
⚡ يحتوي على سكربتات (1)
📁 الوصول إلى نظام الملفات (1)
إصدار التدقيق 2
آمنJan 12, 2026, 04:13 PM
All static findings are false positives. The skill performs legitimate system resource detection using subprocess calls to standard system utilities (nvidia-smi, rocm-smi, system_profiler) for GPU/CPU detection. All commands use hardcoded arguments in list format, preventing shell injection. No user input is processed. The skill outputs a JSON file with resource information for informed computational decisions.
عوامل الخطر
⚙️ الأوامر الخارجية (4)
⚡ يحتوي على سكربتات (1)
📁 الوصول إلى نظام الملفات (1)
إصدار التدقيق 1
مخاطر منخفضةJan 4, 2026, 04:32 PM
The skill only queries local system resources through psutil and system utilities. It writes a JSON file to the current working directory. No network access, credential harvesting, or persistence mechanisms detected. External commands are hardcoded subprocess calls to legitimate system tools (nvidia-smi, rocm-smi, sysctl).