История аудитов
nft-standards - 4 аудиты
Версия аудита 4
Последняя БезопасноJan 17, 2026, 08:45 AM
This skill contains only markdown documentation (SKILL.md) and JSON configuration files (skill-report.json). No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. All 50 static findings are false positives triggered by example Solidity code blocks in documentation. The flagged patterns (C2 keywords, weak crypto, dynamic require, shell backticks) are standard blockchain terminology and documentation formatting, not security threats. Users are not exposed to any data theft, code execution, or privacy risks.
Факторы риска
🌐 Доступ к сети (1)
📁 Доступ к файловой системе (1)
⚡ Содержит скрипты (12)
Версия аудита 3
БезопасноJan 17, 2026, 08:45 AM
This skill contains only markdown documentation (SKILL.md) and JSON configuration files (skill-report.json). No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. All 50 static findings are false positives triggered by example Solidity code blocks in documentation. The flagged patterns (C2 keywords, weak crypto, dynamic require, shell backticks) are standard blockchain terminology and documentation formatting, not security threats. Users are not exposed to any data theft, code execution, or privacy risks.
Факторы риска
🌐 Доступ к сети (1)
📁 Доступ к файловой системе (1)
⚡ Содержит скрипты (12)
Версия аудита 2
БезопасноJan 4, 2026, 04:46 PM
This skill contains only markdown documentation and JSON configuration files. No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. Users are not exposed to any data theft, code execution, or privacy risks.
Версия аудита 1
БезопасноJan 4, 2026, 04:46 PM
This skill contains only markdown documentation and JSON configuration files. No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. Users are not exposed to any data theft, code execution, or privacy risks.