История аудитов
cellxgene-census - 5 аудиты
Версия аудита 5
Последняя Низкий рискJan 21, 2026, 05:20 PM
All 228 static findings are FALSE POSITIVEs. The scanner detected patterns in markdown documentation that are not actual security vulnerabilities. External command detections are backticks in code blocks. C2 keyword detections are the substring 'C2' in 'CELLxGENE'. Cryptographic algorithm detections are documentation patterns. System reconnaissance detections are the word 'reconnaissance' in documentation text. The skill is safe for publication.
Факторы риска
🌐 Доступ к сети (1)
Версия аудита 4
Средний рискJan 17, 2026, 06:04 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Факторы риска
⚙️ Внешние команды (200)
🌐 Доступ к сети (1)
Обнаруженные паттерны
Версия аудита 3
Средний рискJan 17, 2026, 06:04 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Факторы риска
⚙️ Внешние команды (200)
🌐 Доступ к сети (1)
Обнаруженные паттерны
Версия аудита 2
БезопасноJan 12, 2026, 04:28 PM
This is a legitimate bioinformatics tool for accessing the CZ CELLxGENE Census database. The static analysis findings are false positives - the 'external_commands' are actually Python code examples using backticks for markdown formatting, not shell execution. The 'weak cryptographic algorithm' findings reference documentation about data schemas, not actual crypto implementations.
Факторы риска
⚙️ Внешние команды (200)
Версия аудита 1
БезопасноJan 4, 2026, 04:46 PM
This skill contains only markdown documentation with example code patterns. No executable scripts, external commands, network calls, or filesystem access capabilities are present. Pure documentation skill.