Навыки routeros-container История аудитов
📦

История аудитов

routeros-container - 2 аудиты

Версия аудита 2

Последняя Безопасно

Apr 16, 2026, 09:02 PM

This skill is a Markdown documentation file providing instructions and examples for the MikroTik RouterOS /container subsystem. The static scanner flagged 171 patterns, but all are false positives. The 'external_commands' detections match RouterOS CLI syntax inside Markdown code fences, not actual shell execution. The 'network' detections reference example URLs and IPs in documentation snippets. The 'weak cryptographic algorithm' and 'path traversal' findings have no basis in the content. No executable code exists in this file - it is purely instructional documentation for network administrators.

1
Просканировано файлов
348
Проанализировано строк
0
находки
claude
Проверено
Проблем безопасности не найдено

Версия аудита 1

Безопасно

Mar 30, 2026, 02:30 AM

This is a legitimate documentation file for RouterOS container management skill. Static analyzer flagged 170 potential issues, but all are false positives: backtick markers are markdown formatting, btoa() is legitimate base64 encoding for HTTP Basic Auth, and fetch calls are TypeScript code examples in documentation. The skill provides helpful guidance for managing OCI containers on MikroTik hardware.

1
Просканировано файлов
347
Проанализировано строк
6
находки
claude
Проверено
Проблемы среднего риска (1)
Documentation Contains Code Examples with Network Access
The SKILL.md file includes TypeScript code examples showing HTTP fetch calls to RouterOS REST API endpoints. These are legitimate documentation examples for API usage, not malicious network calls.
Проблемы низкого риска (2)
Hardcoded Example IP Addresses
Documentation contains example IP addresses (192.168.1.1) and URLs for educational purposes. These are standard documentation patterns, not security concerns.
Base64 Encoding for Authentication
The btoa() function is used to encode credentials for HTTP Basic Authentication in RouterOS REST API examples. This is the documented method for RouterOS API authentication.

Факторы риска

🌐 Доступ к сети (5)
⚙️ Внешние команды
Конкретные расположения не записаны
📁 Доступ к файловой системе
Конкретные расположения не записаны