Historique des audits
zarr-python - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 07:59 AM
All 227 static findings are FALSE POSITIVES. The analyzer misidentified markdown documentation content as security vulnerabilities. Backticks in markdown are code formatting, not shell execution. Compression codec names (zstd, gzip, lz4) were flagged as cryptographic algorithms but are data compression. URLs are legitimate documentation links. No executable code, shell commands, or cryptographic operations exist in these documentation files.
Facteurs de risque
⚙️ Commandes externes (2)
🌐 Accès réseau (1)
Version de l’audit 3
SûrJan 17, 2026, 07:59 AM
All 227 static findings are FALSE POSITIVES. The analyzer misidentified markdown documentation content as security vulnerabilities. Backticks in markdown are code formatting, not shell execution. Compression codec names (zstd, gzip, lz4) were flagged as cryptographic algorithms but are data compression. URLs are legitimate documentation links. No executable code, shell commands, or cryptographic operations exist in these documentation files.
Facteurs de risque
⚙️ Commandes externes (2)
🌐 Accès réseau (1)
Version de l’audit 2
SûrJan 12, 2026, 04:50 PM
All 209 static findings are FALSE POSITIVES. The analyzer misidentified markdown documentation content as security vulnerabilities. SKILL.md and api_reference.md contain legitimate code examples and documentation for the zarr-python scientific computing library.
Facteurs de risque
⚙️ Commandes externes (187)
🌐 Accès réseau (7)
Version de l’audit 1
SûrJan 4, 2026, 04:21 PM
Documentation-only skill with no executable code. Contains markdown files explaining Zarr library usage with no network calls, file system access, or external command execution beyond its own documentation files.