Historique des audits
vaex - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 07:50 AM
This is a pure documentation skill for the Vaex Python library. All 498 static findings are false positives caused by markdown code block formatting. The scanner misinterpreted backticks in code examples as Ruby/shell commands, flagged memory-mapping as filesystem access, and misidentified DataFrame inspection methods as reconnaissance. No executable code, credential handling, or malicious patterns exist.
Facteurs de risque
⚙️ Commandes externes (7)
📁 Accès au système de fichiers (3)
🌐 Accès réseau (2)
Version de l’audit 3
SûrJan 17, 2026, 07:50 AM
This is a pure documentation skill for the Vaex Python library. All 498 static findings are false positives caused by markdown code block formatting. The scanner misinterpreted backticks in code examples as Ruby/shell commands, flagged memory-mapping as filesystem access, and misidentified DataFrame inspection methods as reconnaissance. No executable code, credential handling, or malicious patterns exist.
Facteurs de risque
⚙️ Commandes externes (7)
📁 Accès au système de fichiers (3)
🌐 Accès réseau (2)
Version de l’audit 2
SûrJan 12, 2026, 04:46 PM
This is a legitimate Vaex documentation skill containing only markdown reference files. All 492 static findings are false positives triggered by markdown code formatting (backticks misinterpreted as Ruby/shell commands), documentation text about algorithms, and legitimate library features like memory-mapping. No actual executable code, credential handling, or malicious patterns exist.
Facteurs de risque
⚙️ Commandes externes (444)
🌐 Accès réseau (1)
📁 Accès au système de fichiers (15)
🔑 Variables d’environnement (1)
Version de l’audit 1
SûrJan 5, 2026, 04:44 PM
Pure documentation skill with no executable code. Contains only reference materials for the Vaex Python library. No security risks identified.