سجل التدقيق
openalex-database - 4 عمليات التدقيق
إصدار التدقيق 4
الأحدث آمنJan 17, 2026, 06:49 AM
All 337 static findings are false positives. The 'external_commands' detections are markdown code block delimiters (```) in documentation, not shell backticks. 'Weak cryptographic algorithm' flags are triggered by substring matches in URL parameters like 'sample=' and 'seed=' - no crypto code exists. 'System reconnaissance' flags are database sampling parameters. No actual security vulnerabilities present. This is a legitimate scholarly API client accessing public OpenAlex database.
عوامل الخطر
🌐 الوصول إلى الشبكة (3)
إصدار التدقيق 3
آمنJan 17, 2026, 06:49 AM
All 337 static findings are false positives. The 'external_commands' detections are markdown code block delimiters (```) in documentation, not shell backticks. 'Weak cryptographic algorithm' flags are triggered by substring matches in URL parameters like 'sample=' and 'seed=' - no crypto code exists. 'System reconnaissance' flags are database sampling parameters. No actual security vulnerabilities present. This is a legitimate scholarly API client accessing public OpenAlex database.
عوامل الخطر
🌐 الوصول إلى الشبكة (3)
إصدار التدقيق 2
آمنJan 12, 2026, 04:15 PM
Static analysis flagged false positives. The 'weak cryptographic algorithm' findings relate to API sampling parameters, not crypto. The 'external_commands' findings are documentation examples in bash code blocks, not executable code. No actual security vulnerabilities detected.
عوامل الخطر
🌐 الوصول إلى الشبكة (3)
إصدار التدقيق 1
مخاطر منخفضةJan 4, 2026, 05:22 PM
Legitimate OpenAlex API client with network access limited to documented endpoints. No credential harvesting, environment harvesting, or persistence behaviors detected. Python scripts perform standard HTTP requests to api.openalex.org.