سجل التدقيق
embedding-strategies - 5 عمليات التدقيق
إصدار التدقيق 5
الأحدث مخاطر منخفضةJan 21, 2026, 07:19 PM
All static findings are false positives. C2 keyword alerts triggered by hash hex strings. Weak crypto alerts from hash substrings. External command alerts from ASCII flow diagrams using arrows. Hardcoded URL alerts are legitimate documentation links. No malicious code, command execution, or data exfiltration patterns found.
إصدار التدقيق 4
مخاطر متوسطةJan 17, 2026, 08:42 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
عوامل الخطر
🌐 الوصول إلى الشبكة (4)
الأنماط المكتشفة
إصدار التدقيق 3
مخاطر متوسطةJan 17, 2026, 08:42 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
عوامل الخطر
🌐 الوصول إلى الشبكة (4)
الأنماط المكتشفة
إصدار التدقيق 2
آمنJan 4, 2026, 05:13 PM
Pure documentation skill with code templates. No network, file system, or credential access. Contains only educational content about embedding models and strategies.
إصدار التدقيق 1
آمنJan 4, 2026, 05:13 PM
Pure documentation skill with code templates. No network, file system, or credential access. Contains only educational content about embedding models and strategies.