Historique des audits
api-design-principles - 4 audits
Version de l’audit 4
Dernier SûrJan 17, 2026, 07:06 AM
This skill contains only educational documentation, code templates, and best practices for API design. All 233 static findings are false positives: 'weak cryptographic algorithm' flags educational password hashing examples; 'backtick execution' misinterprets markdown code formatting; 'system reconnaissance' triggers on legitimate programming terms like fetch/decode; hardcoded URLs/IPs are documentation examples, not actual network calls. No executable code, network calls, or data access patterns pose security risks.
Facteurs de risque
🌐 Accès réseau (7)
⚙️ Commandes externes (134)
Version de l’audit 3
SûrJan 17, 2026, 07:06 AM
This skill contains only educational documentation, code templates, and best practices for API design. All 233 static findings are false positives: 'weak cryptographic algorithm' flags educational password hashing examples; 'backtick execution' misinterprets markdown code formatting; 'system reconnaissance' triggers on legitimate programming terms like fetch/decode; hardcoded URLs/IPs are documentation examples, not actual network calls. No executable code, network calls, or data access patterns pose security risks.
Facteurs de risque
🌐 Accès réseau (7)
⚙️ Commandes externes (134)
Version de l’audit 2
SûrJan 4, 2026, 04:43 PM
This skill contains only educational documentation, code templates, and best practices for API design. No executable code, network calls, or data access patterns were found. The content is purely instructional with static examples and checklists.
Version de l’audit 1
SûrJan 4, 2026, 04:43 PM
This skill contains only educational documentation, code templates, and best practices for API design. No executable code, network calls, or data access patterns were found. The content is purely instructional with static examples and checklists.