Compétences biomni Historique des audits
🧬

Historique des audits

biomni - 4 audits

Version de l’audit 4

Dernier Risque faible

Jan 17, 2026, 05:48 AM

The static analysis flagged 415 patterns, but 95% are FALSE POSITIVES from markdown documentation. The backtick patterns are markdown code delimiters, not shell execution. The API key patterns show example environment variable names in documentation, not actual secrets. The skill is a legitimate Stanford SNAP lab biomedical research framework. The code execution + network + credential combination is the intended design for an AI agent that generates bioinformatics analysis code. Proper security warnings are documented recommending sandboxed execution.

7
Fichiers analysés
3,120
Lignes analysées
4
résultats
claude
Audité par
Aucun problème de sécurité trouvé

Version de l’audit 3

Risque faible

Jan 17, 2026, 05:48 AM

The static analysis flagged 415 patterns, but 95% are FALSE POSITIVES from markdown documentation. The backtick patterns are markdown code delimiters, not shell execution. The API key patterns show example environment variable names in documentation, not actual secrets. The skill is a legitimate Stanford SNAP lab biomedical research framework. The code execution + network + credential combination is the intended design for an AI agent that generates bioinformatics analysis code. Proper security warnings are documented recommending sandboxed execution.

7
Fichiers analysés
3,120
Lignes analysées
4
résultats
claude
Audité par
Aucun problème de sécurité trouvé

Version de l’audit 2

Risque moyen

Jan 12, 2026, 04:17 PM

Biomni is a legitimate biomedical research framework from Stanford that requires code execution capabilities for its core functionality. While static analysis flags many security patterns, these are necessary for an AI agent that generates and executes analysis code. The skill includes proper security warnings and recommends sandboxed execution.

6
Fichiers analysés
2,865
Lignes analysées
3
résultats
claude
Audité par
Aucun problème de sécurité trouvé

Facteurs de risque

⚙️ Commandes externes (1)
🔑 Variables d’environnement (1)
📁 Accès au système de fichiers (1)

Version de l’audit 1

Risque moyen

Jan 4, 2026, 04:41 PM

This skill provides documentation and helper scripts for the biomni biomedical AI framework. The setup script runs external commands (conda) and writes API keys to .env files, which are legitimate setup operations but expand the attack surface. No evidence of obfuscation, credential theft, or malicious network calls.

9
Fichiers analysés
3,185
Lignes analysées
5
résultats
claude
Audité par
Problèmes à risque moyen (1)
Setup script runs external commands
The setup script executes external binaries and a generated test script using subprocess.run(). Example from line 67-69: "subprocess.run(['conda', 'create', '-n', 'biomni_e1', 'python=3.10', '-y'], check=True)". If a malicious binary is earlier in PATH, an attacker could run arbitrary code under the user account. This is a standard setup pattern but requires PATH hygiene.
Problèmes à risque faible (1)
API keys saved in plaintext .env
API keys are written to disk in plaintext format. From lines 145-149: "with open(env_file, 'w') as f:" followed by "f.write(f\"{key}={value}\\n\")". If the directory is shared, backed up insecurely, or accessed by other users, credentials could be exposed. Users should set restrictive file permissions (chmod 600) on .env files.