Habilidades vibe-security Historial de auditorías
🔒

Historial de auditorías

vibe-security - 3 auditorías

Versión de auditoría 3

Más reciente Seguro

Jan 16, 2026, 12:28 PM

This is a legitimate defensive security scanner skill. All 263 static findings are FALSE POSITIVES. The detected patterns are vulnerability detection rules (CSV data files), example vulnerable/safe code pairs (fix templates), and analyzer code that detects security issues in user code. No malicious intent, data exfiltration, or unauthorized access patterns found. The skill helps developers identify and fix security vulnerabilities.

20
Archivos escaneados
3,213
Líneas analizadas
5
hallazgos
claude
Auditado por
No se encontraron problemas de seguridad

Versión de auditoría 2

Seguro

Jan 16, 2026, 12:28 PM

This is a legitimate defensive security scanner skill. All 263 static findings are FALSE POSITIVES. The detected patterns are vulnerability detection rules (CSV data files), example vulnerable/safe code pairs (fix templates), and analyzer code that detects security issues in user code. No malicious intent, data exfiltration, or unauthorized access patterns found. The skill helps developers identify and fix security vulnerabilities.

20
Archivos escaneados
3,213
Líneas analizadas
5
hallazgos
claude
Auditado por
No se encontraron problemas de seguridad

Versión de auditoría 1

Riesgo bajo

Jan 10, 2026, 08:44 AM

Legitimate security scanning tool with no malicious patterns. Contains Python scripts and filesystem access required for code analysis. Uses subprocess only for standard package manager audit tools (npm, pip-audit, cargo). All data processing is local with no exfiltration.

9
Archivos escaneados
2,641
Líneas analizadas
4
hallazgos
claude
Auditado por
Problemas de riesgo bajo (1)
External subprocess execution for package scanning
The CVE integration module uses subprocess to invoke package manager audit tools: npm audit (lines 33-39), pip-audit (lines 72-77), and cargo audit (lines 148-154). These are legitimate security scanning operations but represent external command execution that requires trust.