Audit-Verlauf
zinc-database - 4 Audits
Audit-Version 4
Neueste SicherJan 17, 2026, 08:00 AM
All 389 static findings are false positives. The skill is legitimate scientific documentation for accessing the public ZINC database maintained by UCSF. subprocess.run calls use array syntax with hardcoded ZINC API endpoints. C2 keyword flags are common programming terms (command, control, execute) used in legitimate documentation context. The scanner misinterpreted cheminformatics terminology (MD5/SHA checksums) and DOCK database format files (.db2) as security concerns. No malicious behavior patterns detected.
Risikofaktoren
🌐 Netzwerkzugriff (2)
⚙️ Externe Befehle (1)
Audit-Version 3
SicherJan 17, 2026, 08:00 AM
All 389 static findings are false positives. The skill is legitimate scientific documentation for accessing the public ZINC database maintained by UCSF. subprocess.run calls use array syntax with hardcoded ZINC API endpoints. C2 keyword flags are common programming terms (command, control, execute) used in legitimate documentation context. The scanner misinterpreted cheminformatics terminology (MD5/SHA checksums) and DOCK database format files (.db2) as security concerns. No malicious behavior patterns detected.
Risikofaktoren
🌐 Netzwerkzugriff (2)
⚙️ Externe Befehle (1)
Audit-Version 2
SicherJan 12, 2026, 04:54 PM
This skill contains documentation-only content for accessing the ZINC academic database. All 345 static findings are false positives caused by the scanner misinterpreting scientific terminology. The skill enables read-only queries to a legitimate UCSF-maintained database of molecular compounds for drug discovery research.
Risikofaktoren
⚙️ Externe Befehle (190)
🌐 Netzwerkzugriff (71)
Audit-Version 1
SicherJan 4, 2026, 04:22 PM
No executable code or security risks detected. This is a documentation-only skill that provides information about accessing the ZINC chemical database through standard API endpoints.