Historique des audits
pytorch-lightning - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 08:19 AM
All 843 static findings are false positives. The 'Ruby/shell backtick execution' alerts are markdown code blocks, 'weak cryptographic algorithm' alerts flag normal text like 'DDP/FSDP', and 'eval()' refers to PyTorch's model.eval() method. This is legitimate deep learning documentation with no malicious code.
Facteurs de risque
⚙️ Commandes externes (4)
⚡ Contient des scripts (2)
🌐 Accès réseau (2)
Version de l’audit 3
SûrJan 17, 2026, 08:19 AM
All 843 static findings are false positives. The 'Ruby/shell backtick execution' alerts are markdown code blocks, 'weak cryptographic algorithm' alerts flag normal text like 'DDP/FSDP', and 'eval()' refers to PyTorch's model.eval() method. This is legitimate deep learning documentation with no malicious code.
Facteurs de risque
⚙️ Commandes externes (4)
⚡ Contient des scripts (2)
🌐 Accès réseau (2)
Version de l’audit 2
SûrJan 12, 2026, 04:32 PM
Static analysis generated 834 findings, but evaluation reveals they are all false positives. The 'Ruby/shell backtick execution' findings are Markdown code blocks (```), 'weak cryptographic algorithm' alerts are from normal text, and 'eval()' is PyTorch's model.eval() method. No actual security risks detected.
Facteurs de risque
⚙️ Commandes externes (790)
⚡ Contient des scripts (3)
🌐 Accès réseau (4)
🔑 Variables d’environnement (5)
Version de l’audit 1
SûrJan 4, 2026, 04:38 PM
All files are static templates and documentation for PyTorch Lightning. No data exfiltration, credential theft, or malicious execution patterns detected. Code contains only educational templates and reference documentation.