Histórico de Auditoria
debugging-strategies - 5 auditorias
Versão da auditoria 5
Mais recente SeguroJan 21, 2026, 07:01 PM
Static analysis detected 54 potential issues, all confirmed as false positives. The 'scripts' patterns are Go import statements in code examples. 'External_commands' are markdown backticks used for code formatting. 'Weak cryptographic algorithm' flags are triggered by Go standard library package names (crypto/pprof). 'Network' URLs are GitHub source URLs and localhost debugging endpoints. All findings are legitimate documentation content with no security concerns.
Versão da auditoria 4
Risco MédioJan 17, 2026, 08:14 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Fatores de risco
🌐 Acesso à rede (2)
⚡ Contém scripts (2)
⚙️ Comandos externos (34)
Padrões Detectados
Versão da auditoria 3
Risco MédioJan 17, 2026, 08:14 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Fatores de risco
🌐 Acesso à rede (2)
⚡ Contém scripts (2)
⚙️ Comandos externos (34)
Padrões Detectados
Versão da auditoria 2
SeguroJan 5, 2026, 04:58 PM
Pure prompt-based documentation skill with no executable code. Contains only debugging strategy guidance and educational code examples. No scripts, network calls, filesystem access, or command execution capabilities.
Versão da auditoria 1
SeguroJan 5, 2026, 04:58 PM
Pure prompt-based documentation skill with no executable code. Contains only debugging strategy guidance and educational code examples. No scripts, network calls, filesystem access, or command execution capabilities.