История аудитов
routeros-qemu-chr - 2 аудиты
Версия аудита 2
Последняя Низкий рискApr 16, 2026, 09:11 PM
Documentation and reference skill for running RouterOS CHR in QEMU. Static analysis flagged 343 patterns, but evaluation reveals these are false positives: shell backtick notation in markdown code examples (not execution), sudo in GitHub Actions CI (expected), MD5 references in kernel history docs (not actual usage), and legitimate acceleration detection commands. All network access targets MikroTik infrastructure for downloading CHR images. Risk level set to LOW due to external command patterns in documentation examples, but no actual malicious code present.
Проблемы высокого риска (4)
Проблемы среднего риска (3)
Проблемы низкого риска (2)
Факторы риска
⚙️ Внешние команды (3)
🌐 Доступ к сети (2)
📁 Доступ к файловой системе (2)
Версия аудита 1
БезопасноMar 30, 2026, 02:11 AM
Static analysis detected 303 potential security issues in code examples and documentation. All findings are false positives: external commands are legitimate QEMU invocations for virtualization, network operations access official MikroTik servers, and filesystem operations are standard QEMU configuration patterns. No malicious intent detected.