Audit History
zinc-database - 4 audits
Audit version 4
Latest SafeJan 17, 2026, 08:00 AM
All 389 static findings are false positives. The skill is legitimate scientific documentation for accessing the public ZINC database maintained by UCSF. subprocess.run calls use array syntax with hardcoded ZINC API endpoints. C2 keyword flags are common programming terms (command, control, execute) used in legitimate documentation context. The scanner misinterpreted cheminformatics terminology (MD5/SHA checksums) and DOCK database format files (.db2) as security concerns. No malicious behavior patterns detected.
Risk Factors
๐ Network access (2)
โ๏ธ External commands (1)
Audit version 3
SafeJan 17, 2026, 08:00 AM
All 389 static findings are false positives. The skill is legitimate scientific documentation for accessing the public ZINC database maintained by UCSF. subprocess.run calls use array syntax with hardcoded ZINC API endpoints. C2 keyword flags are common programming terms (command, control, execute) used in legitimate documentation context. The scanner misinterpreted cheminformatics terminology (MD5/SHA checksums) and DOCK database format files (.db2) as security concerns. No malicious behavior patterns detected.
Risk Factors
๐ Network access (2)
โ๏ธ External commands (1)
Audit version 2
SafeJan 12, 2026, 04:54 PM
This skill contains documentation-only content for accessing the ZINC academic database. All 345 static findings are false positives caused by the scanner misinterpreting scientific terminology. The skill enables read-only queries to a legitimate UCSF-maintained database of molecular compounds for drug discovery research.
Risk Factors
โ๏ธ External commands (190)
๐ Network access (71)
Audit version 1
SafeJan 4, 2026, 04:22 PM
No executable code or security risks detected. This is a documentation-only skill that provides information about accessing the ZINC chemical database through standard API endpoints.