Skills nft-standards Audit History
🖼️

Audit History

nft-standards - 4 audits

Audit version 4

Latest Safe

Jan 17, 2026, 08:45 AM

This skill contains only markdown documentation (SKILL.md) and JSON configuration files (skill-report.json). No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. All 50 static findings are false positives triggered by example Solidity code blocks in documentation. The flagged patterns (C2 keywords, weak crypto, dynamic require, shell backticks) are standard blockchain terminology and documentation formatting, not security threats. Users are not exposed to any data theft, code execution, or privacy risks.

2
Files scanned
557
Lines analyzed
4
findings
claude
Audited by
No security issues found

Audit version 3

Safe

Jan 17, 2026, 08:45 AM

This skill contains only markdown documentation (SKILL.md) and JSON configuration files (skill-report.json). No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. All 50 static findings are false positives triggered by example Solidity code blocks in documentation. The flagged patterns (C2 keywords, weak crypto, dynamic require, shell backticks) are standard blockchain terminology and documentation formatting, not security threats. Users are not exposed to any data theft, code execution, or privacy risks.

2
Files scanned
557
Lines analyzed
4
findings
claude
Audited by
No security issues found

Audit version 2

Safe

Jan 4, 2026, 04:46 PM

This skill contains only markdown documentation and JSON configuration files. No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. Users are not exposed to any data theft, code execution, or privacy risks.

4
Files scanned
601
Lines analyzed
0
findings
claude
Audited by
No security issues found

Audit version 1

Safe

Jan 4, 2026, 04:46 PM

This skill contains only markdown documentation and JSON configuration files. No executable code, scripts, network calls, filesystem access beyond its own files, or environment variable reads are present. Users are not exposed to any data theft, code execution, or privacy risks.

4
Files scanned
601
Lines analyzed
0
findings
claude
Audited by
No security issues found