📚

감사 이력

citation-management - 4 감사들

감사 버전 4

최신 낮은 위험

Jan 17, 2026, 06:19 AM

Legitimate academic citation management tool. Static analysis produced 1131 false positives by misinterpreting markdown code blocks as shell commands, list comprehensions as obfuscation, and documentation as network reconnaissance. Actual Python scripts make authorized API calls to public academic databases (CrossRef, PubMed, arXiv) for metadata retrieval.

15
스캔된 파일
8,548
분석된 줄 수
3
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 3

낮은 위험

Jan 17, 2026, 06:19 AM

Legitimate academic citation management tool. Static analysis produced 1131 false positives by misinterpreting markdown code blocks as shell commands, list comprehensions as obfuscation, and documentation as network reconnaissance. Actual Python scripts make authorized API calls to public academic databases (CrossRef, PubMed, arXiv) for metadata retrieval.

15
스캔된 파일
8,548
분석된 줄 수
3
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 2

낮은 위험

Jan 12, 2026, 04:38 PM

Legitimate academic citation management tool. Static scanner produced 1124 false positives by misinterpreting markdown code blocks as Ruby backticks, BibTeX citation keys as cryptographic keys, and documentation URLs as network endpoints. Actual Python scripts make legitimate API calls to public academic databases (CrossRef, PubMed, arXiv) and use standard environment variable patterns for optional API credentials.

14
스캔된 파일
8,213
분석된 줄 수
4
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

감사 버전 1

낮은 위험

Jan 4, 2026, 04:52 PM

The skill includes six Python scripts that access scholarly databases (CrossRef, PubMed, arXiv, Google Scholar) and read/write user-provided BibTeX files. All network calls target legitimate academic APIs documented in the code. The scripts' behavior matches the stated purpose of citation management. No obfuscation, hidden execution paths, or credential theft patterns were detected. Two minor concerns involve HTTP usage for arXiv API and optional proxy configuration for scholarly library rate limiting.

16
스캔된 파일
8,534
분석된 줄 수
6
발견 사항
claude
감사자
낮은 위험 문제 (2)
arXiv API uses plain HTTP
The arXiv API endpoint uses HTTP: `url = 'http://export.arxiv.org/api/query'`. An attacker with network access could observe or modify metadata responses. The queried data is public scholarly metadata with no sensitive user data.
Optional free proxy for scholarly
Google Scholar search can optionally route traffic through free proxies: `pg.FreeProxies()` and `scholarly.use_proxy(pg)`. Proxy operators could observe search queries. This is explicitly optional, disabled by default, and documented in the script.

위험 요인

⚡ 스크립트 포함 (1)
🌐 네트워크 접근 (1)
📁 파일 시스템 액세스 (1)
🔑 환경 변수 (1)