Historique des audits
generate-image - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 07:28 AM
All 153 static findings are FALSE POSITIVES. The skill is a legitimate image generation tool using OpenRouter API. The static scanner flagged standard API key handling, base64 image encoding, and documentation code blocks as suspicious patterns. No malicious intent or exfiltration behavior was found. The code performs exactly as documented - generating images via API calls to https://openrouter.ai/api/v1/chat/completions.
Facteurs de risque
🌐 Accès réseau (1)
📁 Accès au système de fichiers (1)
🔑 Variables d’environnement (1)
⚙️ Commandes externes (1)
Version de l’audit 3
SûrJan 17, 2026, 07:28 AM
All 153 static findings are FALSE POSITIVES. The skill is a legitimate image generation tool using OpenRouter API. The static scanner flagged standard API key handling, base64 image encoding, and documentation code blocks as suspicious patterns. No malicious intent or exfiltration behavior was found. The code performs exactly as documented - generating images via API calls to https://openrouter.ai/api/v1/chat/completions.
Facteurs de risque
🌐 Accès réseau (1)
📁 Accès au système de fichiers (1)
🔑 Variables d’environnement (1)
⚙️ Commandes externes (1)
Version de l’audit 2
SûrJan 12, 2026, 04:57 PM
All 99 static findings are FALSE POSITIVES. The skill is a legitimate image generation tool using OpenRouter API. The static scanner flagged standard API key handling, base64 image encoding, and documentation code blocks as suspicious patterns. No malicious intent or exfiltration behavior was found. The code performs exactly as documented - generating images via API calls.
Facteurs de risque
🌐 Accès réseau (1)
📁 Accès au système de fichiers (1)
🔑 Variables d’environnement (1)
⚙️ Commandes externes (1)
Version de l’audit 1
SûrJan 4, 2026, 04:28 PM
This is a legitimate image generation script. It reads a local .env file for the OpenRouter API key and sends prompts and optional images to the documented OpenRouter endpoint. No credential harvesting, persistence mechanisms, or execution of external code was found. The code behavior matches its stated purpose.