Histórico de Auditoria
go-concurrency-patterns - 4 auditorias
Versão da auditoria 4
Mais recente SeguroJan 17, 2026, 09:08 AM
All 58 static findings are FALSE POSITIVES. The scanner matched substrings without semantic context: 'C2' from 'close()', 'weak crypto' from 'WaitGroup', 'dynamic import' from Go import statements, 'backtick execution' from markdown code formatting, and 'path traversal' from code comments. This is a pure documentation skill containing only markdown and JSON files with Go code examples. No executable code, no network calls beyond documentation links, no filesystem access beyond its own files.
Fatores de risco
🌐 Acesso à rede (1)
⚡ Contém scripts (1)
⚙️ Comandos externos (1)
Versão da auditoria 3
SeguroJan 17, 2026, 09:08 AM
All 58 static findings are FALSE POSITIVES. The scanner matched substrings without semantic context: 'C2' from 'close()', 'weak crypto' from 'WaitGroup', 'dynamic import' from Go import statements, 'backtick execution' from markdown code formatting, and 'path traversal' from code comments. This is a pure documentation skill containing only markdown and JSON files with Go code examples. No executable code, no network calls beyond documentation links, no filesystem access beyond its own files.
Fatores de risco
🌐 Acesso à rede (1)
⚡ Contém scripts (1)
⚙️ Comandos externos (1)
Versão da auditoria 2
SeguroJan 4, 2026, 04:26 PM
This is a pure documentation skill containing only markdown and JSON files. It provides Go concurrency patterns and code examples with no executable scripts, no filesystem access beyond its own files, no network calls, and no environment variable access. The skill is completely safe.
Fatores de risco
🌐 Acesso à rede (1)
Versão da auditoria 1
SeguroJan 4, 2026, 04:26 PM
This is a pure documentation skill containing only markdown and JSON files. It provides Go concurrency patterns and code examples with no executable scripts, no filesystem access beyond its own files, no network calls, and no environment variable access. The skill is completely safe.