Audit-Verlauf
embedding-strategies - 5 Audits
Audit-Version 5
Neueste Niedriges RisikoJan 21, 2026, 07:19 PM
All static findings are false positives. C2 keyword alerts triggered by hash hex strings. Weak crypto alerts from hash substrings. External command alerts from ASCII flow diagrams using arrows. Hardcoded URL alerts are legitimate documentation links. No malicious code, command execution, or data exfiltration patterns found.
Audit-Version 4
Mittleres RisikoJan 17, 2026, 08:42 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Risikofaktoren
🌐 Netzwerkzugriff (4)
Erkannte Muster
Audit-Version 3
Mittleres RisikoJan 17, 2026, 08:42 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Risikofaktoren
🌐 Netzwerkzugriff (4)
Erkannte Muster
Audit-Version 2
SicherJan 4, 2026, 05:13 PM
Pure documentation skill with code templates. No network, file system, or credential access. Contains only educational content about embedding models and strategies.
Audit-Version 1
SicherJan 4, 2026, 05:13 PM
Pure documentation skill with code templates. No network, file system, or credential access. Contains only educational content about embedding models and strategies.