Навыки gget История аудитов
🧬

История аудитов

gget - 4 аудиты

Версия аудита 4

Последняя Безопасно

Jan 17, 2026, 07:38 AM

This is legitimate bioinformatics software. All 614 static findings are false positives: markdown code fences were misidentified as Ruby shell execution, hardcoded URLs are public genomic databases (Ensembl, UniProt, NCBI), cryptographic patterns are data integrity checksums, and the critical heuristic is standard bioinformatics behavior (network queries to public APIs + local file operations for results).

9
Просканировано файлов
3,490
Проанализировано строк
2
находки
claude
Проверено
Проблем безопасности не найдено

Факторы риска

Версия аудита 3

Безопасно

Jan 17, 2026, 07:38 AM

This is legitimate bioinformatics software. All 614 static findings are false positives: markdown code fences were misidentified as Ruby shell execution, hardcoded URLs are public genomic databases (Ensembl, UniProt, NCBI), cryptographic patterns are data integrity checksums, and the critical heuristic is standard bioinformatics behavior (network queries to public APIs + local file operations for results).

9
Просканировано файлов
3,490
Проанализировано строк
2
находки
claude
Проверено
Проблем безопасности не найдено

Факторы риска

Версия аудита 2

Низкий риск

Jan 12, 2026, 04:16 PM

This is a legitimate bioinformatics tool. All 592 static findings are FALSE POSITIVES triggered by markdown documentation format. The analyzer misinterpreted markdown code block delimiters (backticks) as Ruby backtick execution, and flagged bioinformatics algorithm names as 'weak cryptographic algorithms'. No subprocess, os.system, or command injection patterns exist in the actual Python code.

7
Просканировано файлов
3,046
Проанализировано строк
2
находки
claude
Проверено
Проблем безопасности не найдено

Факторы риска

⚙️ Внешние команды (1)
🌐 Доступ к сети (1)

Версия аудита 1

Безопасно

Jan 4, 2026, 04:34 PM

The skill provides wrapper scripts for the gget bioinformatics library. No credential theft, data exfiltration, or malicious code execution patterns were found. All network calls go to legitimate genomic databases (Ensembl, UniProt, AlphaFold, etc.). Filesystem access is limited to reading user-provided gene lists and writing results to local directories.

10
Просканировано файлов
3,190
Проанализировано строк
3
находки
claude
Проверено
Проблем безопасности не найдено