Scan Report
5 /100
csv-documentation-generator
Generate Computerized System Validation (CSV) documentation for pharmaceutical and medical device industries
A legitimate GxP compliance documentation generator with no malicious behavior detected. All subprocess usage is for documented purposes (pip install, git operations) and all capabilities are properly declared in SKILL.md.
Safe to install
This skill is safe to use. The only minor concern is the missing post-commit hook file referenced in install.sh, which should be created to avoid installation failures.
Findings 3 items
| Severity | Finding | Location |
|---|---|---|
| Low | Missing post-commit hook file | scripts/git-hooks/install.sh:11 |
| Info | Unpinned dependency versions | requirements.txt:1 |
| Info | venv auto-creation in skill directory | scripts/generate.py:58 |
| Resource | Declared | Inferred | Status | Evidence |
|---|---|---|---|---|
| Filesystem | WRITE | WRITE | ✓ Aligned | SKILL.md:requiredTools declares 'write' |
| Shell | WRITE | WRITE | ✓ Aligned | SKILL.md:requiredTools declares 'exec'; scripts/generate.py:78 uses subprocess f… |
| Environment | READ | READ | ✓ Aligned | scripts/agent.py:52 reads environment variables for agent detection |
| Network | NONE | NONE | — | No network requests found |
5 findings
Medium External URL 外部 URL
https://semver.org/ CHANGELOG.md:321 Medium External URL 外部 URL
https://img.shields.io/badge/version-1.6.4-blue.svg README.md:3 Medium External URL 外部 URL
https://img.shields.io/badge/GAMP-5%20Second%20Edition-green.svg README.md:4 Medium External URL 外部 URL
https://img.shields.io/badge/21%20CFR%20Part%2011-Compliant-orange.svg README.md:5 Medium External URL 外部 URL
https://img.shields.io/badge/status-beta-yellow.svg README.md:6 File Tree
58 files · 486.5 KB · 14584 lines Python 26f · 7998L
Markdown 24f · 5916L
JSON 4f · 365L
YAML 2f · 216L
Shell 1f · 85L
Text 1f · 4L
├─
▾
references
│ ├─
21cfr-part11.md
Markdown
│ ├─
annex-11.md
Markdown
│ ├─
data-integrity.md
Markdown
│ └─
gamp-5.md
Markdown
├─
▾
scripts
│ ├─
▾
audit
│ │ ├─
__init__.py
Python
│ │ └─
log.py
Python
│ ├─
▾
fill
│ │ ├─
__init__.py
Python
│ │ └─
filler.py
Python
│ ├─
▾
git-hooks
│ │ └─
install.sh
Shell
│ ├─
▾
requirements
│ │ ├─
__init__.py
Python
│ │ ├─
linker.py
Python
│ │ ├─
parser.py
Python
│ │ ├─
risk_analyzer.py
Python
│ │ └─
versioning.py
Python
│ ├─
▾
tests
│ │ ├─
__init__.py
Python
│ │ ├─
parser.py
Python
│ │ ├─
test_bidirectional_sync.py
Python
│ │ ├─
test_compliance_checker.py
Python
│ │ ├─
test_core.py
Python
│ │ ├─
test_git_hooks.py
Python
│ │ └─
test_versioning.py
Python
│ ├─
__init__.py
Python
│ ├─
agent.py
Python
│ ├─
cli.py
Python
│ ├─
compliance_checker.py
Python
│ ├─
config.py
Python
│ ├─
excel_generator.py
Python
│ ├─
generate.py
Python
│ ├─
standards_reader.py
Python
│ ├─
template_loader.py
Python
│ └─
word_generator.py
Python
├─
▾
standards
│ └─
code-annotations.json
JSON
├─
▾
templates
│ ├─
▾
ci
│ │ ├─
github-actions.yml
YAML
│ │ └─
gitlab-ci.yml
YAML
│ ├─
▾
examples
│ │ ├─
fs-example.md
Markdown
│ │ ├─
iq-example.md
Markdown
│ │ ├─
ra-example.md
Markdown
│ │ └─
urs-example.md
Markdown
│ ├─
fs.md
Markdown
│ ├─
iq.md
Markdown
│ ├─
oq.md
Markdown
│ ├─
pq.md
Markdown
│ ├─
ra.md
Markdown
│ ├─
ts.md
Markdown
│ ├─
urs.md
Markdown
│ ├─
vp.md
Markdown
│ └─
vsr.md
Markdown
├─
.csv-docs-config.json
JSON
├─
audit-log.json
JSON
├─
CHANGELOG_en.md
Markdown
├─
CHANGELOG.md
Markdown
├─
prompts.md
Markdown
├─
README_en.md
Markdown
├─
README.md
Markdown
├─
requirements.json
JSON
├─
requirements.txt
Text
├─
SKILL.md
Markdown
└─
STANDARDS.md
Markdown
Dependencies 4 items
| Package | Version | Source | Known Vulns | Notes |
|---|---|---|---|---|
python-docx | >=1.1.0 | pip | No | Version not pinned |
openpyxl | >=3.1.0 | pip | No | Version not pinned |
jinja2 | >=3.1.0 | pip | No | Version not pinned |
python-dateutil | >=2.8.0 | pip | No | Version not pinned |
Security Positives
✓ All subprocess usage is for legitimate documented purposes (pip install, git operations)
✓ No credential harvesting or environment variable iteration for sensitive keys
✓ No network exfiltration or external IP communication
✓ No base64/encoded commands or eval patterns
✓ No access to sensitive paths (~/.ssh, ~/.aws, .env)
✓ No hidden functionality not declared in documentation
✓ Clean audit logging of all operations
✓ Comprehensive requirements parsing and compliance checking
✓ Agent detection uses only environment variables (CSV_DOCS_MODE) - no process scanning