📦

審計歷史

routeros-fundamentals - 2 審計

審計版本 2

最新 安全

Apr 16, 2026, 09:03 PM

Security scan detected 1898 potential issues, but all are false positives. The skill consists entirely of markdown documentation files containing RouterOS v7 reference material. The static scanner misidentified markdown code fences (backticks around code blocks) as Ruby shell execution, API documentation examples as code implementation, and common networking terminology as command-and-control indicators. No executable code, no credential exfiltration, no network access, and no malicious patterns exist. This is legitimate educational documentation for MikroTik RouterOS administrators.

14
已掃描檔案
3,265
分析行數
2
發現項
claude
審計者
未發現安全問題

審計版本 1

低風險

Mar 30, 2026, 02:06 AM

Static analyzer flagged 434 patterns but all are false positives on documentation content. The skill contains RouterOS CLI reference material and TypeScript usage examples - no executable code. External command patterns are RouterOS CLI syntax (/system/print), network patterns are documentation examples for REST API usage, and crypto/C2 keywords are version strings (rc=release candidate). Safe for publication with minor documentation risk warnings.

6
已掃描檔案
804
分析行數
5
發現項
claude
審計者
低風險問題 (2)
Documentation Contains System Command Examples
Skill documentation includes RouterOS CLI command examples that could be misused if users copy commands without understanding context. Commands like /system/reboot and /disk/format are documented for educational purposes.
Network Configuration Examples with Default Credentials
Documentation shows RouterOS default authentication pattern (admin with empty password) which is accurate for fresh installations but could normalize insecure practices if users do not change defaults.