技能 biomni 審計歷史
🧬

審計歷史

biomni - 4 審計

審計版本 4

最新 低風險

Jan 17, 2026, 05:48 AM

The static analysis flagged 415 patterns, but 95% are FALSE POSITIVES from markdown documentation. The backtick patterns are markdown code delimiters, not shell execution. The API key patterns show example environment variable names in documentation, not actual secrets. The skill is a legitimate Stanford SNAP lab biomedical research framework. The code execution + network + credential combination is the intended design for an AI agent that generates bioinformatics analysis code. Proper security warnings are documented recommending sandboxed execution.

7
已掃描檔案
3,120
分析行數
4
發現項
claude
審計者
未發現安全問題

審計版本 3

低風險

Jan 17, 2026, 05:48 AM

The static analysis flagged 415 patterns, but 95% are FALSE POSITIVES from markdown documentation. The backtick patterns are markdown code delimiters, not shell execution. The API key patterns show example environment variable names in documentation, not actual secrets. The skill is a legitimate Stanford SNAP lab biomedical research framework. The code execution + network + credential combination is the intended design for an AI agent that generates bioinformatics analysis code. Proper security warnings are documented recommending sandboxed execution.

7
已掃描檔案
3,120
分析行數
4
發現項
claude
審計者
未發現安全問題

審計版本 2

中風險

Jan 12, 2026, 04:17 PM

Biomni is a legitimate biomedical research framework from Stanford that requires code execution capabilities for its core functionality. While static analysis flags many security patterns, these are necessary for an AI agent that generates and executes analysis code. The skill includes proper security warnings and recommends sandboxed execution.

6
已掃描檔案
2,865
分析行數
3
發現項
claude
審計者
未發現安全問題

風險因素

審計版本 1

中風險

Jan 4, 2026, 04:41 PM

This skill provides documentation and helper scripts for the biomni biomedical AI framework. The setup script runs external commands (conda) and writes API keys to .env files, which are legitimate setup operations but expand the attack surface. No evidence of obfuscation, credential theft, or malicious network calls.

9
已掃描檔案
3,185
分析行數
5
發現項
claude
審計者
中風險問題 (1)
Setup script runs external commands
The setup script executes external binaries and a generated test script using subprocess.run(). Example from line 67-69: "subprocess.run(['conda', 'create', '-n', 'biomni_e1', 'python=3.10', '-y'], check=True)". If a malicious binary is earlier in PATH, an attacker could run arbitrary code under the user account. This is a standard setup pattern but requires PATH hygiene.
低風險問題 (1)
API keys saved in plaintext .env
API keys are written to disk in plaintext format. From lines 145-149: "with open(env_file, 'w') as f:" followed by "f.write(f\"{key}={value}\\n\")". If the directory is shared, backed up insecurely, or accessed by other users, credentials could be exposed. Users should set restrictive file permissions (chmod 600) on .env files.