Historial de auditorías
debugging-strategies - 5 auditorías
Versión de auditoría 5
Más reciente SeguroJan 21, 2026, 07:01 PM
Static analysis detected 54 potential issues, all confirmed as false positives. The 'scripts' patterns are Go import statements in code examples. 'External_commands' are markdown backticks used for code formatting. 'Weak cryptographic algorithm' flags are triggered by Go standard library package names (crypto/pprof). 'Network' URLs are GitHub source URLs and localhost debugging endpoints. All findings are legitimate documentation content with no security concerns.
Versión de auditoría 4
Riesgo medioJan 17, 2026, 08:14 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Factores de riesgo
🌐 Acceso a red (2)
⚡ Contiene scripts (2)
⚙️ Comandos externos (34)
Patrones detectados
Versión de auditoría 3
Riesgo medioJan 17, 2026, 08:14 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Factores de riesgo
🌐 Acceso a red (2)
⚡ Contiene scripts (2)
⚙️ Comandos externos (34)
Patrones detectados
Versión de auditoría 2
SeguroJan 5, 2026, 04:58 PM
Pure prompt-based documentation skill with no executable code. Contains only debugging strategy guidance and educational code examples. No scripts, network calls, filesystem access, or command execution capabilities.
Versión de auditoría 1
SeguroJan 5, 2026, 04:58 PM
Pure prompt-based documentation skill with no executable code. Contains only debugging strategy guidance and educational code examples. No scripts, network calls, filesystem access, or command execution capabilities.