스킬 file-organizer 감사 이력
📁

감사 이력

file-organizer - 5 감사들

감사 버전 5

최신 안전

Jan 17, 2026, 05:55 AM

All 74 static findings are FALSE POSITIVES. The skill is a prompt-based documentation file containing file organization instructions using standard Unix commands. The static analyzer misinterpreted markdown syntax and metadata fields as security issues. MD5 hashing is used for duplicate file detection (not cryptography). Backticks are markdown code block delimiters, not shell execution. No executable code, network calls, or credential access.

2
스캔된 파일
610
분석된 줄 수
3
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 4

안전

Jan 17, 2026, 05:55 AM

All 74 static findings are FALSE POSITIVES. The skill is a prompt-based documentation file containing file organization instructions using standard Unix commands. The static analyzer misinterpreted markdown syntax and metadata fields as security issues. MD5 hashing is used for duplicate file detection (not cryptography). Backticks are markdown code block delimiters, not shell execution. No executable code, network calls, or credential access.

2
스캔된 파일
610
분석된 줄 수
3
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 3

안전

Jan 10, 2026, 01:29 PM

This is a prompt-based skill containing only documentation. It provides instructions for organizing files using standard Unix commands. No executable code, no network calls, no credential access, and no persistence mechanisms. All destructive operations require explicit user confirmation.

1
스캔된 파일
434
분석된 줄 수
0
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 2

안전

Jan 10, 2026, 01:29 PM

This is a prompt-based skill containing only documentation. It provides instructions for organizing files using standard Unix commands. No executable code, no network calls, no credential access, and no persistence mechanisms. All destructive operations require explicit user confirmation.

1
스캔된 파일
434
분석된 줄 수
0
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 1

안전

Jan 10, 2026, 01:29 PM

This is a prompt-based skill containing only documentation. It provides instructions for organizing files using standard Unix commands. No executable code, no network calls, no credential access, and no persistence mechanisms. All destructive operations require explicit user confirmation.

1
스캔된 파일
434
분석된 줄 수
0
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다