Historique des audits
geniml - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 07:29 AM
Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.
Facteurs de risque
Version de l’audit 3
SûrJan 17, 2026, 07:29 AM
Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.
Facteurs de risque
Version de l’audit 2
SûrJan 12, 2026, 05:00 PM
All 179 static findings are FALSE POSITIVES. The analyzer incorrectly flagged documentation examples as security vulnerabilities. All findings are in markdown documentation files showing CLI command examples, documentation URLs, cache folder references, and library integration examples. No actual executable code with security implications exists in this repository.
Facteurs de risque
⚙️ Commandes externes (145)
🌐 Accès réseau (5)
⚡ Contient des scripts (1)
📁 Accès au système de fichiers (4)
Version de l’audit 1
SûrJan 4, 2026, 04:29 PM
No credential access, environment harvesting, or network exfiltration patterns were found. Content is documentation and examples aligned with genomic ML workflows.