Historique des audits
labarchive-integration - 4 audits
Version de l’audit 4
Dernier Risque faibleJan 17, 2026, 06:08 AM
All 275 static findings are false positives. Scanner triggered on markdown documentation (backtick syntax), security best practices (encrypt keyword), standard file operations (file existence checks), and legitimate API endpoints. Code review confirms no malicious patterns. This is legitimate LabArchives electronic lab notebook API integration.
Facteurs de risque
⚡ Contient des scripts (3)
🌐 Accès réseau (3)
📁 Accès au système de fichiers (3)
Version de l’audit 3
Risque faibleJan 17, 2026, 06:08 AM
All 275 static findings are false positives. Scanner triggered on markdown documentation (backtick syntax), security best practices (encrypt keyword), standard file operations (file existence checks), and legitimate API endpoints. Code review confirms no malicious patterns. This is legitimate LabArchives electronic lab notebook API integration.
Facteurs de risque
⚡ Contient des scripts (3)
🌐 Accès réseau (3)
📁 Accès au système de fichiers (3)
Version de l’audit 2
Risque faibleJan 12, 2026, 04:38 PM
The static analysis flagged numerous false positives. The 'external_commands' findings are markdown code blocks showing API URL patterns, not actual command execution. The 'weak cryptographic algorithm' findings reference MD5 in documentation examples, not actual implementation. This is a legitimate research tool for LabArchives API integration with no malicious intent detected.
Facteurs de risque
🌐 Accès réseau (3)
📁 Accès au système de fichiers (2)
Version de l’audit 1
Risque faibleJan 4, 2026, 04:43 PM
This is a legitimate LabArchives API integration skill for electronic lab notebooks. Scripts make documented API calls to LabArchives endpoints only. Credentials are stored in config.yaml with restrictive 600 file permissions. No credential harvesting, exfiltration, or unexpected network destinations detected.