Compétences gget Historique des audits
🧬

Historique des audits

gget - 4 audits

Version de l’audit 4

Dernier Sûr

Jan 17, 2026, 07:38 AM

This is legitimate bioinformatics software. All 614 static findings are false positives: markdown code fences were misidentified as Ruby shell execution, hardcoded URLs are public genomic databases (Ensembl, UniProt, NCBI), cryptographic patterns are data integrity checksums, and the critical heuristic is standard bioinformatics behavior (network queries to public APIs + local file operations for results).

9
Fichiers analysés
3,490
Lignes analysées
2
résultats
claude
Audité par
Aucun problème de sécurité trouvé

Version de l’audit 3

Sûr

Jan 17, 2026, 07:38 AM

This is legitimate bioinformatics software. All 614 static findings are false positives: markdown code fences were misidentified as Ruby shell execution, hardcoded URLs are public genomic databases (Ensembl, UniProt, NCBI), cryptographic patterns are data integrity checksums, and the critical heuristic is standard bioinformatics behavior (network queries to public APIs + local file operations for results).

9
Fichiers analysés
3,490
Lignes analysées
2
résultats
claude
Audité par
Aucun problème de sécurité trouvé

Version de l’audit 2

Risque faible

Jan 12, 2026, 04:16 PM

This is a legitimate bioinformatics tool. All 592 static findings are FALSE POSITIVES triggered by markdown documentation format. The analyzer misinterpreted markdown code block delimiters (backticks) as Ruby backtick execution, and flagged bioinformatics algorithm names as 'weak cryptographic algorithms'. No subprocess, os.system, or command injection patterns exist in the actual Python code.

7
Fichiers analysés
3,046
Lignes analysées
2
résultats
claude
Audité par
Aucun problème de sécurité trouvé

Facteurs de risque

⚙️ Commandes externes (1)
🌐 Accès réseau (1)

Version de l’audit 1

Sûr

Jan 4, 2026, 04:34 PM

The skill provides wrapper scripts for the gget bioinformatics library. No credential theft, data exfiltration, or malicious code execution patterns were found. All network calls go to legitimate genomic databases (Ensembl, UniProt, AlphaFold, etc.). Filesystem access is limited to reading user-provided gene lists and writing results to local directories.

10
Fichiers analysés
3,190
Lignes analysées
3
résultats
claude
Audité par
Aucun problème de sécurité trouvé