Skills hypogenic Audit History
📊

Audit History

hypogenic - 6 audits

Audit version 6

Latest Low Risk

Jan 21, 2026, 05:27 PM

This scientific hypothesis generation skill was scanned with 126 potential issues detected. After evaluation, all findings are false positives: environment variable references for API keys follow security best practices; hardcoded URLs are legitimate documentation links; shell command examples are user setup instructions; no actual cryptographic code or command-and-control patterns exist. The skill makes normal LLM API calls for hypothesis generation, which is expected functionality.

3
Files scanned
2,075
Lines analyzed
2
findings
claude
Audited by
No security issues found

Audit version 5

Medium Risk

Jan 17, 2026, 07:51 AM

AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.

3
Files scanned
1,017
Lines analyzed
3
findings
claude
Audited by
No security issues found

Risk Factors

🔑 Env variables (2)
🌐 Network access (18)
⚙️ External commands (80)

Detected Patterns

Generic API/secret keysWeak cryptographic algorithmHardcoded URLC2 keywordsRuby/shell backtick executionSystem reconnaissance[HEURISTIC] DANGEROUS COMBINATION: Code execution + Network + Credential access

Audit version 4

Medium Risk

Jan 17, 2026, 07:51 AM

AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.

3
Files scanned
1,017
Lines analyzed
3
findings
claude
Audited by
No security issues found

Risk Factors

🔑 Env variables (2)
🌐 Network access (18)
⚙️ External commands (80)

Detected Patterns

Generic API/secret keysWeak cryptographic algorithmHardcoded URLC2 keywordsRuby/shell backtick executionSystem reconnaissance[HEURISTIC] DANGEROUS COMBINATION: Code execution + Network + Credential access

Audit version 3

Medium Risk

Jan 12, 2026, 04:30 PM

The skill contains legitimate research tooling with some security considerations. External command execution is used for academic tools like GROBID PDF processing, not malicious purposes. API key access is standard for LLM integration. The 'C2 keywords' finding appears to be a false positive - the context is academic citations, not command & control infrastructure.

2
Files scanned
806
Lines analyzed
5
findings
claude
Audited by
Medium Risk Issues (1)
External command execution for GROBID PDF processing
External commands are used to set up and run GROBID for PDF literature processing. GROBID is a legitimate open-source academic tool for extracting structured information from scientific PDFs. The bash scripts in modules/ directory are used for academic research purposes, not for malicious activities.
Low Risk Issues (1)
Hardcoded URLs to academic resources
The skill references hardcoded URLs pointing to legitimate academic resources including arXiv papers, GitHub repositories for the ChicagoHAI research group, and PyPI package distribution. These URLs are for accessing open-source research tools and datasets essential to the skill's functionality.

Risk Factors

🔑 Env variables (1)
⚙️ External commands (2)
🌐 Network access (2)

Audit version 2

Medium Risk

Jan 12, 2026, 04:30 PM

The skill contains legitimate research tooling with some security considerations. External command execution is used for academic tools like GROBID PDF processing, not malicious purposes. API key access is standard for LLM integration. The 'C2 keywords' finding appears to be a false positive - the context is academic citations, not command & control infrastructure.

2
Files scanned
806
Lines analyzed
5
findings
claude
Audited by
Medium Risk Issues (1)
External command execution for GROBID PDF processing
External commands are used to set up and run GROBID for PDF literature processing. GROBID is a legitimate open-source academic tool for extracting structured information from scientific PDFs. The bash scripts in modules/ directory are used for academic research purposes, not for malicious activities.
Low Risk Issues (1)
Hardcoded URLs to academic resources
The skill references hardcoded URLs pointing to legitimate academic resources including arXiv papers, GitHub repositories for the ChicagoHAI research group, and PyPI package distribution. These URLs are for accessing open-source research tools and datasets essential to the skill's functionality.

Risk Factors

🔑 Env variables (1)
⚙️ External commands (2)
🌐 Network access (2)

Audit version 1

Safe

Jan 4, 2026, 04:39 PM

The skill files are pure documentation and configuration templates. No executable code exists in the skill directory. All described functionality (CLI commands, Python API, Redis caching) refers to an external hypogenic package that users install separately. The skill itself only provides guidance, templates, and usage instructions for Claude to help users work with this external package.

5
Files scanned
1,036
Lines analyzed
1
findings
claude
Audited by
No security issues found

Risk Factors