Audit History
embedding-strategies - 5 audits
Audit version 5
Latest Low RiskJan 21, 2026, 07:19 PM
All static findings are false positives. C2 keyword alerts triggered by hash hex strings. Weak crypto alerts from hash substrings. External command alerts from ASCII flow diagrams using arrows. Hardcoded URL alerts are legitimate documentation links. No malicious code, command execution, or data exfiltration patterns found.
Audit version 4
Medium RiskJan 17, 2026, 08:42 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Risk Factors
🌐 Network access (4)
Detected Patterns
Audit version 3
Medium RiskJan 17, 2026, 08:42 AM
AI analysis failed after multiple attempts - MANUAL REVIEW REQUIRED before publishing. This skill cannot be auto-published until reviewed by a human.
Risk Factors
🌐 Network access (4)
Detected Patterns
Audit version 2
SafeJan 4, 2026, 05:13 PM
Pure documentation skill with code templates. No network, file system, or credential access. Contains only educational content about embedding models and strategies.
Audit version 1
SafeJan 4, 2026, 05:13 PM
Pure documentation skill with code templates. No network, file system, or credential access. Contains only educational content about embedding models and strategies.