Histórico de Auditoria
linear-issues-read - 5 auditorias
Versão da auditoria 5
Mais recente SeguroJan 16, 2026, 05:57 PM
Read-only Linear API client using official SDK. Accesses LINEAR_API_KEY for authentication and makes network calls only to Linear's official API. All static findings are false positives - credential access is legitimate for API authentication, network calls go to intended Linear endpoints, and code execution uses only the official SDK.
Fatores de risco
🌐 Acesso à rede (1)
🔑 Variáveis de ambiente (1)
Versão da auditoria 4
SeguroJan 16, 2026, 05:57 PM
Read-only Linear API client using official SDK. Accesses LINEAR_API_KEY for authentication and makes network calls only to Linear's official API. All static findings are false positives - credential access is legitimate for API authentication, network calls go to intended Linear endpoints, and code execution uses only the official SDK.
Fatores de risco
🌐 Acesso à rede (1)
🔑 Variáveis de ambiente (1)
Versão da auditoria 3
Baixo RiscoJan 10, 2026, 11:33 AM
Read-only Linear API client using official SDK. Accesses LINEAR_API_KEY environment variable for authentication and makes network calls only to Linear's official API endpoints. No code execution, no file system access beyond its own directory, and no data exfiltration patterns detected.
Fatores de risco
🌐 Acesso à rede (2)
🔑 Variáveis de ambiente (1)
Versão da auditoria 2
Baixo RiscoJan 10, 2026, 11:33 AM
Read-only Linear API client using official SDK. Accesses LINEAR_API_KEY environment variable for authentication and makes network calls only to Linear's official API endpoints. No code execution, no file system access beyond its own directory, and no data exfiltration patterns detected.
Fatores de risco
🌐 Acesso à rede (2)
🔑 Variáveis de ambiente (1)
Versão da auditoria 1
Baixo RiscoJan 10, 2026, 11:33 AM
Read-only Linear API client using official SDK. Accesses LINEAR_API_KEY environment variable for authentication and makes network calls only to Linear's official API endpoints. No code execution, no file system access beyond its own directory, and no data exfiltration patterns detected.