История аудитов
geniml - 4 аудиты
Версия аудита 4
Последняя БезопасноJan 17, 2026, 07:29 AM
Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.
Факторы риска
Версия аудита 3
БезопасноJan 17, 2026, 07:29 AM
Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.
Факторы риска
Версия аудита 2
БезопасноJan 12, 2026, 05:00 PM
All 179 static findings are FALSE POSITIVES. The analyzer incorrectly flagged documentation examples as security vulnerabilities. All findings are in markdown documentation files showing CLI command examples, documentation URLs, cache folder references, and library integration examples. No actual executable code with security implications exists in this repository.
Факторы риска
⚙️ Внешние команды (145)
🌐 Доступ к сети (5)
⚡ Содержит скрипты (1)
📁 Доступ к файловой системе (4)
Версия аудита 1
БезопасноJan 4, 2026, 04:29 PM
No credential access, environment harvesting, or network exfiltration patterns were found. Content is documentation and examples aligned with genomic ML workflows.