🔍

감사 이력

vector-index-tuning - 4 감사들

감사 버전 4

최신 안전

Jan 17, 2026, 08:42 AM

Pure documentation skill with instructional Python templates for vector index tuning. All static findings are false positives: hardcoded URLs are documentation references, weak crypto patterns matched legitimate quantization terminology, backticks are markdown formatting, and memory-mapped references are Qdrant config parameters.

2
스캔된 파일
723
분석된 줄 수
1
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

위험 요인

🌐 네트워크 접근 (1)

감사 버전 3

안전

Jan 17, 2026, 08:42 AM

Pure documentation skill with instructional Python templates for vector index tuning. All static findings are false positives: hardcoded URLs are documentation references, weak crypto patterns matched legitimate quantization terminology, backticks are markdown formatting, and memory-mapped references are Qdrant config parameters.

2
스캔된 파일
723
분석된 줄 수
1
발견 사항
claude
감사자
보안 문제를 찾지 못했습니다

위험 요인

🌐 네트워크 접근 (1)

감사 버전 2

낮은 위험

Jan 4, 2026, 04:40 PM

Pure documentation skill with instructional Python templates for vector index tuning. Contains Qdrant client examples that make network calls to user-provided database instances - this is expected and legitimate behavior for database tuning content.

4
스캔된 파일
735
분석된 줄 수
2
발견 사항
claude
감사자
낮은 위험 문제 (1)
Qdrant client network calls in examples
The Qdrant integration examples import and use QdrantClient which would make network connections to a database. This is legitimate for vector database tuning content. Users provide their own database endpoint.

위험 요인

🌐 네트워크 접근 (1)

감사 버전 1

낮은 위험

Jan 4, 2026, 04:40 PM

Pure documentation skill with instructional Python templates for vector index tuning. Contains Qdrant client examples that make network calls to user-provided database instances - this is expected and legitimate behavior for database tuning content.

4
스캔된 파일
735
분석된 줄 수
2
발견 사항
claude
감사자
낮은 위험 문제 (1)
Qdrant client network calls in examples
The Qdrant integration examples import and use QdrantClient which would make network connections to a database. This is legitimate for vector database tuning content. Users provide their own database endpoint.

위험 요인

🌐 네트워크 접근 (1)