Historique des audits
sql-optimization-patterns - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 10:23 AM
All 111 static findings are false positives. The skill contains only instructional SQL documentation. The scanner triggered on: SHA256 hash values (misidentified as C2 keywords), database terminology like 'hash' in Hash Join explanations, markdown code fences (misidentified as backticks), and SQL query examples (misidentified as reconnaissance). No executable code, network calls, or malicious patterns exist.
Facteurs de risque
🌐 Accès réseau (1)
⚙️ Commandes externes (42)
📁 Accès au système de fichiers (1)
Version de l’audit 3
SûrJan 17, 2026, 10:23 AM
All 111 static findings are false positives. The skill contains only instructional SQL documentation. The scanner triggered on: SHA256 hash values (misidentified as C2 keywords), database terminology like 'hash' in Hash Join explanations, markdown code fences (misidentified as backticks), and SQL query examples (misidentified as reconnaissance). No executable code, network calls, or malicious patterns exist.
Facteurs de risque
🌐 Accès réseau (1)
⚙️ Commandes externes (42)
📁 Accès au système de fichiers (1)
Version de l’audit 2
SûrJan 4, 2026, 04:28 PM
The skill contains only instructional text and SQL examples. No executable code, network access, or sensitive file access patterns were found.
Version de l’audit 1
SûrJan 4, 2026, 04:28 PM
The skill contains only instructional text and SQL examples. No executable code, network access, or sensitive file access patterns were found.