📦

审计历史

routeros-fundamentals - 2 审计

审计版本 2

最新 安全

Apr 16, 2026, 09:03 PM

Security scan detected 1898 potential issues, but all are false positives. The skill consists entirely of markdown documentation files containing RouterOS v7 reference material. The static scanner misidentified markdown code fences (backticks around code blocks) as Ruby shell execution, API documentation examples as code implementation, and common networking terminology as command-and-control indicators. No executable code, no credential exfiltration, no network access, and no malicious patterns exist. This is legitimate educational documentation for MikroTik RouterOS administrators.

14
已扫描文件
3,265
分析行数
2
发现项
claude
审计者
未发现安全问题

审计版本 1

低风险

Mar 30, 2026, 02:06 AM

Static analyzer flagged 434 patterns but all are false positives on documentation content. The skill contains RouterOS CLI reference material and TypeScript usage examples - no executable code. External command patterns are RouterOS CLI syntax (/system/print), network patterns are documentation examples for REST API usage, and crypto/C2 keywords are version strings (rc=release candidate). Safe for publication with minor documentation risk warnings.

6
已扫描文件
804
分析行数
5
发现项
claude
审计者
低风险问题 (2)
Documentation Contains System Command Examples
Skill documentation includes RouterOS CLI command examples that could be misused if users copy commands without understanding context. Commands like /system/reboot and /disk/format are documented for educational purposes.
Network Configuration Examples with Default Credentials
Documentation shows RouterOS default authentication pattern (admin with empty password) which is accurate for fresh installations but could normalize insecure practices if users do not change defaults.