Historique des audits
networkx - 6 audits
Version de l’audit 6
Dernier SûrJan 21, 2026, 06:44 PM
All static findings are false positives. The skill is a documentation/reference guide for NetworkX (Python graph library). Static scanner flagged markdown code formatting backticks as 'shell execution' and documentation about file I/O operations as 'filesystem access'. No malicious code, credential access, or command injection exists. The skill provides safe Python graph processing guidance.
Facteurs de risque
📁 Accès au système de fichiers (7)
🌐 Accès réseau (4)
Version de l’audit 5
Risque moyenJan 17, 2026, 02:21 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Facteurs de risque
⚙️ Commandes externes (349)
📁 Accès au système de fichiers (7)
🌐 Accès réseau (5)
Motifs détectés
Version de l’audit 4
Risque moyenJan 17, 2026, 02:21 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Facteurs de risque
⚙️ Commandes externes (349)
📁 Accès au système de fichiers (7)
🌐 Accès réseau (5)
Motifs détectés
Version de l’audit 3
SûrJan 7, 2026, 12:48 AM
This skill contains only documentation with Python code examples for the NetworkX library. No executable scripts, network calls, credential access, or external command execution. All documented functionality (graph I/O, data processing) is appropriate for the stated purpose of network analysis.
Version de l’audit 2
SûrJan 7, 2026, 12:48 AM
This skill contains only documentation with Python code examples for the NetworkX library. No executable scripts, network calls, credential access, or external command execution. All documented functionality (graph I/O, data processing) is appropriate for the stated purpose of network analysis.
Version de l’audit 1
SûrJan 7, 2026, 12:48 AM
This skill contains only documentation with Python code examples for the NetworkX library. No executable scripts, network calls, credential access, or external command execution. All documented functionality (graph I/O, data processing) is appropriate for the stated purpose of network analysis.