📊

Audit History

scientific-visualization - 4 audits

Audit version 4

Latest Safe

Jan 17, 2026, 06:47 AM

All 309 static findings are false positives. The scanner misidentifies hex color codes (#E69F00, etc.) as cryptographic hashes, markdown code blocks as shell execution, and configuration variables as certificate files. This is a legitimate scientific visualization library with matplotlib styling, color palettes, and figure export utilities. No actual security risks exist - the skill only manipulates local figure files and contains no network calls, external commands, or credential handling.

13
Files scanned
3,894
Lines analyzed
2
findings
claude
Audited by
No security issues found

Audit version 3

Safe

Jan 17, 2026, 06:47 AM

All 309 static findings are false positives. The scanner misidentifies hex color codes (#E69F00, etc.) as cryptographic hashes, markdown code blocks as shell execution, and configuration variables as certificate files. This is a legitimate scientific visualization library with matplotlib styling, color palettes, and figure export utilities. No actual security risks exist - the skill only manipulates local figure files and contains no network calls, external commands, or credential handling.

13
Files scanned
3,894
Lines analyzed
2
findings
claude
Audited by
No security issues found

Audit version 2

Safe

Jan 12, 2026, 05:01 PM

The static analysis findings are overwhelmingly false positives. The 'weak cryptographic algorithm' alerts are triggered by color hex codes (e.g., #E69F00) being misidentified as hashes. The 'external commands' findings are code examples in documentation, not actual command execution. The 'certificate/key files' findings are also false positives - no actual cryptographic materials are present. This is a legitimate scientific visualization library with no security risks.

11
Files scanned
3,430
Lines analyzed
2
findings
claude
Audited by
No security issues found

Risk Factors

🌐 Network access (1)
⚙️ External commands (1)

Audit version 1

Low Risk

Jan 4, 2026, 04:55 PM

This is a pure scientific visualization skill. It contains Python helper scripts that configure matplotlib settings and export figures to local files. No network calls, no credential access, no code execution hooks. The filesystem access is limited to saving user-specified figure outputs.

14
Files scanned
3,422
Lines analyzed
3
findings
claude
Audited by
Low Risk Issues (1)
Local file write operations in export script
The figure_export.py script writes figures to local files using matplotlib's savefig functionality. The code at lines 61-95 saves figures to user-specified paths via fig.savefig(). This is expected behavior for a visualization export tool and poses minimal risk as output paths are user-controlled.