Historique des audits
linear-milestones-read - 5 audits
Version de l’audit 5
Dernier SûrJan 16, 2026, 06:05 PM
Legitimate read-only Linear API integration. Accesses LINEAR_API_KEY for authentication and makes authenticated requests to Linear's official API endpoints. No code execution paths, no suspicious network destinations, no filesystem access beyond standard .env configuration. All 40 static findings are false positives triggered by documentation patterns and legitimate credential handling.
Facteurs de risque
🌐 Accès réseau (1)
🔑 Variables d’environnement (1)
Version de l’audit 4
SûrJan 16, 2026, 06:05 PM
Legitimate read-only Linear API integration. Accesses LINEAR_API_KEY for authentication and makes authenticated requests to Linear's official API endpoints. No code execution paths, no suspicious network destinations, no filesystem access beyond standard .env configuration. All 40 static findings are false positives triggered by documentation patterns and legitimate credential handling.
Facteurs de risque
🌐 Accès réseau (1)
🔑 Variables d’environnement (1)
Version de l’audit 3
SûrJan 10, 2026, 11:37 AM
Read-only Linear API integration for listing milestones. Accesses LINEAR_API_KEY environment variable for authentication and makes authenticated requests to Linear's servers. No filesystem access beyond configuration files, no code execution paths, no suspicious network destinations.
Facteurs de risque
🌐 Accès réseau (1)
🔑 Variables d’environnement (1)
Version de l’audit 2
SûrJan 10, 2026, 11:37 AM
Read-only Linear API integration for listing milestones. Accesses LINEAR_API_KEY environment variable for authentication and makes authenticated requests to Linear's servers. No filesystem access beyond configuration files, no code execution paths, no suspicious network destinations.
Facteurs de risque
🌐 Accès réseau (1)
🔑 Variables d’environnement (1)
Version de l’audit 1
SûrJan 10, 2026, 11:37 AM
Read-only Linear API integration for listing milestones. Accesses LINEAR_API_KEY environment variable for authentication and makes authenticated requests to Linear's servers. No filesystem access beyond configuration files, no code execution paths, no suspicious network destinations.