Historial de auditorías
citation-management - 4 auditorías
Versión de auditoría 4
Más reciente Riesgo bajoJan 17, 2026, 06:19 AM
Legitimate academic citation management tool. Static analysis produced 1131 false positives by misinterpreting markdown code blocks as shell commands, list comprehensions as obfuscation, and documentation as network reconnaissance. Actual Python scripts make authorized API calls to public academic databases (CrossRef, PubMed, arXiv) for metadata retrieval.
Factores de riesgo
🌐 Acceso a red (3)
📁 Acceso al sistema de archivos (2)
🔑 Variables de entorno (2)
Versión de auditoría 3
Riesgo bajoJan 17, 2026, 06:19 AM
Legitimate academic citation management tool. Static analysis produced 1131 false positives by misinterpreting markdown code blocks as shell commands, list comprehensions as obfuscation, and documentation as network reconnaissance. Actual Python scripts make authorized API calls to public academic databases (CrossRef, PubMed, arXiv) for metadata retrieval.
Factores de riesgo
🌐 Acceso a red (3)
📁 Acceso al sistema de archivos (2)
🔑 Variables de entorno (2)
Versión de auditoría 2
Riesgo bajoJan 12, 2026, 04:38 PM
Legitimate academic citation management tool. Static scanner produced 1124 false positives by misinterpreting markdown code blocks as Ruby backticks, BibTeX citation keys as cryptographic keys, and documentation URLs as network endpoints. Actual Python scripts make legitimate API calls to public academic databases (CrossRef, PubMed, arXiv) and use standard environment variable patterns for optional API credentials.
Factores de riesgo
⚡ Contiene scripts (3)
🌐 Acceso a red (2)
📁 Acceso al sistema de archivos (2)
🔑 Variables de entorno (1)
Versión de auditoría 1
Riesgo bajoJan 4, 2026, 04:52 PM
The skill includes six Python scripts that access scholarly databases (CrossRef, PubMed, arXiv, Google Scholar) and read/write user-provided BibTeX files. All network calls target legitimate academic APIs documented in the code. The scripts' behavior matches the stated purpose of citation management. No obfuscation, hidden execution paths, or credential theft patterns were detected. Two minor concerns involve HTTP usage for arXiv API and optional proxy configuration for scholarly library rate limiting.