История аудитов
fetching-library-docs - 5 аудиты
Версия аудита 5
Последняя БезопасноJan 16, 2026, 06:26 PM
All 236 static findings are false positives. The scanner misinterpreted documentation code examples as executing code, hash symbols as cryptographic algorithms, and legitimate MCP infrastructure code as dangerous patterns. The skill is a benign documentation fetcher that uses hardcoded commands to communicate with known MCP servers.
Факторы риска
⚡ Содержит скрипты (3)
Версия аудита 4
БезопасноJan 16, 2026, 06:26 PM
All 236 static findings are false positives. The scanner misinterpreted documentation code examples as executing code, hash symbols as cryptographic algorithms, and legitimate MCP infrastructure code as dangerous patterns. The skill is a benign documentation fetcher that uses hardcoded commands to communicate with known MCP servers.
Факторы риска
⚡ Содержит скрипты (3)
Версия аудита 3
Низкий рискJan 10, 2026, 10:37 AM
Legitimate documentation fetcher using Context7 MCP. Contains shell scripts and subprocess execution for MCP server communication. Minor concerns around library name handling in shell commands but purpose matches behavior. No credential or sensitive data access attempts.
Проблемы среднего риска (1)
Проблемы низкого риска (2)
Факторы риска
⚡ Содержит скрипты (5)
⚙️ Внешние команды (3)
🌐 Доступ к сети (2)
Версия аудита 2
Низкий рискJan 10, 2026, 10:37 AM
Legitimate documentation fetcher using Context7 MCP. Contains shell scripts and subprocess execution for MCP server communication. Minor concerns around library name handling in shell commands but purpose matches behavior. No credential or sensitive data access attempts.
Проблемы среднего риска (1)
Проблемы низкого риска (2)
Факторы риска
⚡ Содержит скрипты (5)
⚙️ Внешние команды (3)
🌐 Доступ к сети (2)
Версия аудита 1
Низкий рискJan 10, 2026, 10:37 AM
Legitimate documentation fetcher using Context7 MCP. Contains shell scripts and subprocess execution for MCP server communication. Minor concerns around library name handling in shell commands but purpose matches behavior. No credential or sensitive data access attempts.