cspell-gitignore
npmIs cspell-gitignore safe to use?
Based on the latest brin safety scan, no vulnerabilities or threats were detected for cspell-gitignore v9.6.4. Trust score: 65/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.
Install (safety-checked)
cspell-gitignore Passed Security Checks
No security concerns detected
0
0
0
No Concerns Detected
No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
cspell-gitignore Capabilities & Permissions
What cspell-gitignore can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Filesystem Access
Reads from the filesystem.
AGENTS.md for cspell-gitignore
Good instructions lead to good results. brin adds cspell-gitignore documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
cspell-gitignore Documentation & Source Code
For the full cspell-gitignore README, API documentation, and source code, visit the official package registry.