Skills geniml Audit History
🧬

Audit History

geniml - 4 audits

Audit version 4

Latest Safe

Jan 17, 2026, 07:29 AM

Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.

8
Files scanned
2,570
Lines analyzed
1
findings
claude
Audited by
No security issues found

Audit version 3

Safe

Jan 17, 2026, 07:29 AM

Static analysis flagged 194 patterns, but ALL are false positives. The 'external_commands' findings are markdown bash code blocks in documentation (not actual shell execution). 'Weak cryptographic' refers to MD5 checksums for file verification (legitimate bioinformatics practice). 'Ransomware keywords' is a false positive triggered by security audit text itself. 'Hidden file access' refers to standard cache directories. All patterns represent legitimate genomic ML workflows.

8
Files scanned
2,570
Lines analyzed
1
findings
claude
Audited by
No security issues found

Audit version 2

Safe

Jan 12, 2026, 05:00 PM

All 179 static findings are FALSE POSITIVES. The analyzer incorrectly flagged documentation examples as security vulnerabilities. All findings are in markdown documentation files showing CLI command examples, documentation URLs, cache folder references, and library integration examples. No actual executable code with security implications exists in this repository.

6
Files scanned
1,360
Lines analyzed
4
findings
claude
Audited by
No security issues found

Risk Factors

⚙️ External commands (145)
references/bedspace.md:23-30 references/bedspace.md:30-34 references/bedspace.md:34-38 references/bedspace.md:38-44 references/bedspace.md:44-52 references/bedspace.md:52-55 references/bedspace.md:55-56 references/bedspace.md:56-57 references/bedspace.md:57-63 references/bedspace.md:63-69 references/bedspace.md:69-78 references/bedspace.md:78-80 references/bedspace.md:80-83 references/bedspace.md:83-85 references/bedspace.md:85-88 references/bedspace.md:88-90 references/bedspace.md:90-92 references/bedspace.md:92-96 references/bedspace.md:96-108 references/bedspace.md:108-112 references/consensus_peaks.md:21-23 references/consensus_peaks.md:23-29 references/consensus_peaks.md:29-31 references/consensus_peaks.md:31-34 references/consensus_peaks.md:34-35 references/consensus_peaks.md:35-36 references/consensus_peaks.md:36-50 references/consensus_peaks.md:50-57 references/consensus_peaks.md:57-60 references/consensus_peaks.md:60-61 references/consensus_peaks.md:61-62 references/consensus_peaks.md:62-70 references/consensus_peaks.md:70-78 references/consensus_peaks.md:78-81 references/consensus_peaks.md:81-89 references/consensus_peaks.md:89-96 references/consensus_peaks.md:96-99 references/consensus_peaks.md:99-107 references/consensus_peaks.md:107-114 references/consensus_peaks.md:114-117 references/consensus_peaks.md:117-123 references/consensus_peaks.md:123-135 references/consensus_peaks.md:135-158 references/consensus_peaks.md:158-159 references/consensus_peaks.md:159-160 references/consensus_peaks.md:160-176 references/consensus_peaks.md:176-188 references/consensus_peaks.md:188-199 references/consensus_peaks.md:199-203 references/region2vec.md:25-33 references/region2vec.md:33-41 references/region2vec.md:41-53 references/region2vec.md:53-59 references/region2vec.md:59-60 references/region2vec.md:60-61 references/region2vec.md:61-62 references/region2vec.md:62-63 references/region2vec.md:63-67 references/region2vec.md:67-75 references/region2vec.md:75-79 references/region2vec.md:79 references/region2vec.md:79 references/region2vec.md:79 references/scembed.md:19 references/scembed.md:19 references/scembed.md:19 references/scembed.md:19 references/scembed.md:23-38 references/scembed.md:38-44 references/scembed.md:44-52 references/scembed.md:52-63 references/scembed.md:63-86 references/scembed.md:86-92 references/scembed.md:92-103 references/scembed.md:103-109 references/scembed.md:109-123 references/scembed.md:123-131 references/scembed.md:131-132 references/scembed.md:132-133 references/scembed.md:133-134 references/scembed.md:134-135 references/scembed.md:135-136 references/scembed.md:136-147 references/scembed.md:147-155 references/scembed.md:155-161 references/scembed.md:161-177 references/scembed.md:177-189 references/scembed.md:189-194 references/utilities.md:19-30 references/utilities.md:30-34 references/utilities.md:34-43 references/utilities.md:43-69 references/utilities.md:69-79 references/utilities.md:79-83 references/utilities.md:83-90 references/utilities.md:90-95 references/utilities.md:95-97 references/utilities.md:97-101 references/utilities.md:101-103 references/utilities.md:103-107 references/utilities.md:107-109 references/utilities.md:109-137 references/utilities.md:137-149 references/utilities.md:149-161 references/utilities.md:161-173 references/utilities.md:173-201 references/utilities.md:201-210 references/utilities.md:210-213 references/utilities.md:213-219 references/utilities.md:219-228 references/utilities.md:228-231 references/utilities.md:231-237 references/utilities.md:237-247 references/utilities.md:247-260 references/utilities.md:260-270 references/utilities.md:270-298 references/utilities.md:298-306 references/utilities.md:306-310 references/utilities.md:310-326 references/utilities.md:326-341 references/utilities.md:341-352 references/utilities.md:352-356 references/utilities.md:356-364 references/utilities.md:364-369 references/utilities.md:369-383 SKILL.md:19-21 SKILL.md:21-25 SKILL.md:25-27 SKILL.md:27-31 SKILL.md:31-33 SKILL.md:33-50 SKILL.md:50-64 SKILL.md:64-79 SKILL.md:79-98 SKILL.md:98-111 SKILL.md:111-117 SKILL.md:117-143 SKILL.md:143-147 SKILL.md:147-174 SKILL.md:174-178 SKILL.md:178-196 SKILL.md:196-202 SKILL.md:202-220 SKILL.md:220-273 SKILL.md:273-313
🌐 Network access (5)
⚡ Contains scripts (1)
📁 Filesystem access (4)

Audit version 1

Safe

Jan 4, 2026, 04:29 PM

No credential access, environment harvesting, or network exfiltration patterns were found. Content is documentation and examples aligned with genomic ML workflows.

6
Files scanned
1,352
Lines analyzed
0
findings
claude
Audited by
No security issues found