@grouparoo/email-authentication
npmIs @grouparoo/email-authentication safe to use?
Based on the latest brin safety scan, no vulnerabilities or threats were detected for @grouparoo/email-authentication v0.1.25. Trust score: 75/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.
Install (safety-checked)
@grouparoo/email-authentication Passed Security Checks
No security concerns detected
0
0
1
Install Scripts Detected
This package runs scripts during installation. Review these scripts before installing.
No Concerns Detected
No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
@grouparoo/email-authentication Capabilities & Permissions
What @grouparoo/email-authentication can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Environment Variables
Accesses the following environment variables.
AGENTS.md for @grouparoo/email-authentication
Good instructions lead to good results. brin adds @grouparoo/email-authentication documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
@grouparoo/email-authentication Documentation & Source Code
For the full @grouparoo/email-authentication README, API documentation, and source code, visit the official package registry.
Frequently asked questions about @grouparoo/email-authentication safety
Install (safety-checked)
Weekly Downloads
Version
0.1.25License
MPL-2.0Last Scanned
Trust Score
Install Scripts
This package has install scripts that run automatically:
prepare
Capabilities
Accesses: NEXT_DISABLED, SERVER_TOKEN