Histórico de Auditoria
file-boundaries - 5 auditorias
Versão da auditoria 5
Mais recente SeguroJan 16, 2026, 10:15 PM
This is a pure prompt-based documentation skill containing only guidance rules for multi-agent coordination. The skill teaches agents to recognize and respect file ownership boundaries, preventing conflicts in parallel work. No executable code, no file system access, no network calls, no command execution capabilities. The static findings are false positives: SHA256 hash identifiers were misidentified as C2/weak crypto, and YAML code block examples were misidentified as shell execution.
Fatores de risco
🌐 Acesso à rede (1)
📁 Acesso ao sistema de arquivos (1)
⚙️ Comandos externos (8)
Versão da auditoria 4
SeguroJan 16, 2026, 10:15 PM
This is a pure prompt-based documentation skill containing only guidance rules for multi-agent coordination. The skill teaches agents to recognize and respect file ownership boundaries, preventing conflicts in parallel work. No executable code, no file system access, no network calls, no command execution capabilities. The static findings are false positives: SHA256 hash identifiers were misidentified as C2/weak crypto, and YAML code block examples were misidentified as shell execution.
Fatores de risco
🌐 Acesso à rede (1)
📁 Acesso ao sistema de arquivos (1)
⚙️ Comandos externos (8)
Versão da auditoria 3
SeguroJan 10, 2026, 12:35 PM
This is a pure prompt-based skill containing only documentation and guidance rules. No executable code, no file system access, no network calls, no command execution. The skill teaches agents to respect file ownership boundaries, which is a safety mechanism.
Versão da auditoria 2
SeguroJan 10, 2026, 12:35 PM
This is a pure prompt-based skill containing only documentation and guidance rules. No executable code, no file system access, no network calls, no command execution. The skill teaches agents to respect file ownership boundaries, which is a safety mechanism.
Versão da auditoria 1
SeguroJan 10, 2026, 12:35 PM
This is a pure prompt-based skill containing only documentation and guidance rules. No executable code, no file system access, no network calls, no command execution. The skill teaches agents to respect file ownership boundaries, which is a safety mechanism.