Audit History
qryma-search - 4 audits
Audit version 4
Latest SafeApr 2, 2026, 02:51 AM
Static analysis detected 136 potential security issues across 12 files. After evaluation, all findings are false positives related to legitimate skill functionality: environment variable access for API key authentication, network requests to official Qryma API endpoints, shell commands in documentation examples, and configuration file reading. No evidence of malicious intent, credential exfiltration, or data theft. The skill follows standard patterns for API-based search tools with proper error handling.
Low Risk Issues (1)
Risk Factors
🔑 Env variables (5)
🌐 Network access (2)
Audit version 3
SafeMar 26, 2026, 02:31 AM
All 112 static analyzer findings were evaluated and determined to be FALSE POSITIVES. The env_access patterns are legitimate API key configuration. Network calls go to the documented Qryma API endpoint. External command findings are markdown documentation examples, not actual shell execution. Filesystem access targets standard configuration directories. No malicious patterns, code execution, data exfiltration, or obfuscation detected. The skill is safe for publication.
Low Risk Issues (1)
Risk Factors
🔑 Env variables (3)
🌐 Network access (2)
📁 Filesystem access (2)
Audit version 2
Low RiskMar 25, 2026, 09:16 AM
Static analysis flagged 112 potential issues, but most are false positives. Environment variable access (QRYMA_API_KEY, QRYMA_ENDPOINT) is legitimate configuration for an API-based skill. Network calls target the documented Qryma API endpoint. External command findings are documentation examples in markdown, not executable code. Filesystem access is limited to standard config file locations (~/.qryma/.env). No malicious patterns detected.
Low Risk Issues (2)
Risk Factors
🔑 Env variables (6)
🌐 Network access (2)
📁 Filesystem access (2)
Audit version 1
Low RiskMar 25, 2026, 08:14 AM
Static analyzer flagged 112 patterns but evaluation shows these are false positives. Environment variable access (QRYMA_API_KEY, QRYMA_ENDPOINT) is standard configuration for API-based tools. Network requests to search.qryma.com represent core functionality. Hidden file access (~/.qryma/.env) is legitimate config storage. No malicious patterns, credential exfiltration, or obfuscation detected. The skill is a transparent web search tool requiring user-provided API credentials.