Skills research-lookup Audit History
🔬

Audit History

research-lookup - 4 audits

Audit version 4

Latest Low Risk

Jan 17, 2026, 06:22 AM

This is a legitimate academic research tool that makes API calls to OpenRouter for literature searches. All 146 static findings are false positives: (1) API key environment reads are standard authentication for OPENROUTER_API_KEY, (2) network calls target the legitimate OpenRouter API endpoint, (3) 'external commands' flagged in SKILL.md are documentation examples showing command syntax, not runtime code execution, and (4) 'weak cryptographic algorithm' mentions are ML architecture names (transformer, RNN) misidentified as cryptographic algorithms. No malicious patterns detected after intent analysis.

6
Files scanned
2,314
Lines analyzed
4
findings
claude
Audited by
No security issues found

Audit version 3

Low Risk

Jan 17, 2026, 06:22 AM

This is a legitimate academic research tool that makes API calls to OpenRouter for literature searches. All 146 static findings are false positives: (1) API key environment reads are standard authentication for OPENROUTER_API_KEY, (2) network calls target the legitimate OpenRouter API endpoint, (3) 'external commands' flagged in SKILL.md are documentation examples showing command syntax, not runtime code execution, and (4) 'weak cryptographic algorithm' mentions are ML architecture names (transformer, RNN) misidentified as cryptographic algorithms. No malicious patterns detected after intent analysis.

6
Files scanned
2,314
Lines analyzed
4
findings
claude
Audited by
No security issues found

Audit version 2

Safe

Jan 12, 2026, 04:44 PM

This is a legitimate academic research tool that makes API calls to OpenRouter for literature searches. The static scanner flagged 127 potential issues, but all are false positives: (1) API key environment reads are standard authentication, (2) network calls target the legitimate OpenRouter API, (3) 'external commands' flagged in SKILL.md are documentation examples, not code, and (4) 'weak cryptographic algorithm' mentions are ML architecture names (transformer, RNN) misidentified as crypto. No malicious patterns detected.

4
Files scanned
1,346
Lines analyzed
4
findings
claude
Audited by
No security issues found

Risk Factors

🔑 Env variables (27)
🌐 Network access (10)
📁 Filesystem access (1)
⚙️ External commands (64)

Audit version 1

Low Risk

Jan 5, 2026, 04:14 PM

Legitimate research lookup skill. Makes API calls to OpenRouter for Perplexity Sonar models. Reads OPENROUTER_API_KEY for authentication. No suspicious patterns detected.

6
Files scanned
1,226
Lines analyzed
2
findings
claude
Audited by
No security issues found