Histórico de Auditoria
geniml - 4 auditorias
Versão da auditoria 4
Mais recente SeguroJan 17, 2026, 07:29 AM
Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.
Fatores de risco
Versão da auditoria 3
SeguroJan 17, 2026, 07:29 AM
Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.
Fatores de risco
Versão da auditoria 2
SeguroJan 12, 2026, 05:00 PM
All 179 static findings are FALSE POSITIVES. The analyzer incorrectly flagged documentation examples as security vulnerabilities. All findings are in markdown documentation files showing CLI command examples, documentation URLs, cache folder references, and library integration examples. No actual executable code with security implications exists in this repository.
Fatores de risco
⚙️ Comandos externos (145)
🌐 Acesso à rede (5)
⚡ Contém scripts (1)
📁 Acesso ao sistema de arquivos (4)
Versão da auditoria 1
SeguroJan 4, 2026, 04:29 PM
No credential access, environment harvesting, or network exfiltration patterns were found. Content is documentation and examples aligned with genomic ML workflows.