Historique des audits
rag-implementation - 4 audits
Version de l’audit 4
Dernier Risque faibleJan 17, 2026, 09:35 AM
This is a documentation-only skill containing Markdown guides with Python code examples. No executable scripts, network calls, or file access capabilities exist in the skill itself. All static findings are false positives from the scanner misinterpreting documentation patterns as security risks. Code examples demonstrate typical RAG patterns using LangChain APIs. No obfuscation, persistence mechanisms, or malicious patterns detected.
Facteurs de risque
🌐 Accès réseau (3)
⚙️ Commandes externes (37)
🔑 Variables d’environnement (1)
Version de l’audit 3
Risque faibleJan 17, 2026, 09:35 AM
This is a documentation-only skill containing Markdown guides with Python code examples. No executable scripts, network calls, or file access capabilities exist in the skill itself. All static findings are false positives from the scanner misinterpreting documentation patterns as security risks. Code examples demonstrate typical RAG patterns using LangChain APIs. No obfuscation, persistence mechanisms, or malicious patterns detected.
Facteurs de risque
🌐 Accès réseau (3)
⚙️ Commandes externes (37)
🔑 Variables d’environnement (1)
Version de l’audit 2
Risque faibleJan 4, 2026, 05:03 PM
This is a documentation-only skill containing Markdown guides with Python code examples. No executable scripts, no network calls, and no file access capabilities exist in the skill itself. The code examples demonstrate typical RAG patterns using LangChain APIs. No obfuscation, persistence mechanisms, or malicious patterns detected.
Facteurs de risque
📁 Accès au système de fichiers (1)
🌐 Accès réseau (1)
Version de l’audit 1
Risque faibleJan 4, 2026, 05:03 PM
This is a documentation-only skill containing Markdown guides with Python code examples. No executable scripts, no network calls, and no file access capabilities exist in the skill itself. The code examples demonstrate typical RAG patterns using LangChain APIs. No obfuscation, persistence mechanisms, or malicious patterns detected.