cardinal

npm

Is cardinal safe to use?

The latest brin safety scan flagged cardinal v2.1.1 with risk indicators that warrant review. No known CVE vulnerabilities. Trust score: 65/100. Review the findings below before use. This is an automated assessment and may contain errors.

Install (safety-checked)

cardinal Has Warnings

Warnings detected due to potential concerns

warning
CVEs

0

Threats

0

Install Scripts

0

Risk Indicators

  • Can spawn child processes

brin Recommendations

  • This package has warnings detected. Evaluate the specific concerns before proceeding.

Install with brin add cardinal to automatically apply these checks before installation.

This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.

cardinal Capabilities & Permissions

What cardinal can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.

Filesystem Access

Reads and writes to the filesystem.

.env (r)/usr/ (r)node_modules (r)

Process Spawning

This package can spawn child processes.

Environment Variables

Accesses the following environment variables.

HOME

AGENTS.md for cardinal

Good instructions lead to good results. brin adds cardinal documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.

brin init

Vercel's research: 100% accuracy with AGENTS.md vs 53% without →

cardinal Documentation & Source Code

For the full cardinal README, API documentation, and source code, visit the official package registry.

Frequently asked questions about cardinal safety

Weekly Downloads

3.7M

Version

2.1.1

License

MIT

Last Scanned

Feb 1, 2026

Trust Score

65/100·Legitimacy signals, not safety

Capabilities

Filesystem

Reads & Writes files

Process

Spawns child processes

Environment

Accesses: HOME

Is cardinal Safe? | npm Safety Scan - brin