Historique des audits
pathml - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 07:03 AM
PathML is a legitimate open-source computational pathology toolkit. All 554 static findings are false positives - the scanner detected patterns in markdown documentation (code examples) rather than actual executable code. The 'eval()' detections are PyTorch's model.eval() method, not dynamic code execution. Shell command patterns are documentation examples for batch processing workflows. No malicious intent, data exfiltration, or security vulnerabilities confirmed.
Facteurs de risque
⚡ Contient des scripts (2)
⚙️ Commandes externes (2)
🌐 Accès réseau (1)
📁 Accès au système de fichiers (1)
Version de l’audit 3
SûrJan 17, 2026, 07:03 AM
PathML is a legitimate open-source computational pathology toolkit. All 554 static findings are false positives - the scanner detected patterns in markdown documentation (code examples) rather than actual executable code. The 'eval()' detections are PyTorch's model.eval() method, not dynamic code execution. Shell command patterns are documentation examples for batch processing workflows. No malicious intent, data exfiltration, or security vulnerabilities confirmed.
Facteurs de risque
⚡ Contient des scripts (2)
⚙️ Commandes externes (2)
🌐 Accès réseau (1)
📁 Accès au système de fichiers (1)
Version de l’audit 2
SûrJan 12, 2026, 04:20 PM
PathML is a legitimate scientific computing library for pathology image analysis. Static findings are false positives - the code uses standard scientific computing patterns (eval for configuration, backticks for documentation examples, memory mapping for large images). No malicious intent detected.
Facteurs de risque
⚡ Contient des scripts (1)
⚙️ Commandes externes (1)
🌐 Accès réseau (1)
📁 Accès au système de fichiers (1)
Version de l’audit 1
SûrJan 4, 2026, 05:25 PM
This skill contains only documentation files with no executable code. All content consists of markdown reference guides and metadata. The example code snippets are purely illustrative and do not execute. No malicious patterns, data exfiltration, credential theft, or code execution capabilities are present.