tar
npmIs tar safe to use?
Based on the latest brin safety scan, no vulnerabilities or threats were detected for tar v7.5.7. Trust score: 65/100. 3 known CVEs, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.
Install (safety-checked)
tar Passed Security Checks
No security concerns detected
3
0
0
tar CVE Vulnerabilities (3)
node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization
Fixed in: 7.5.3
Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS
Fixed in: 7.5.4
node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
Fixed in: 7.5.7
brin Recommendations
- →Update to a patched version to address 3 high-severity CVEs.
Install with brin add tar to automatically apply these checks before installation.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
tar Capabilities & Permissions
What tar can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Filesystem Access
Reads and writes to the filesystem.
Environment Variables
Accesses the following environment variables.
AGENTS.md for tar
Good instructions lead to good results. brin adds tar documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
tar Documentation & Source Code
For the full tar README, API documentation, and source code, visit the official package registry.
Frequently asked questions about tar safety
Install (safety-checked)
Weekly Downloads
Version
7.5.7License
BlueOak-1.0.0Last Scanned
Trust Score
CVEs (3)
node-tar is Vulnerable to Arbitrary File Overwrite and Symlink Poisoning via Insufficient Path Sanitization
Fixed in: 7.5.3
Race Condition in node-tar Path Reservations via Unicode Ligature Collisions on macOS APFS
Fixed in: 7.5.4
node-tar Vulnerable to Arbitrary File Creation/Overwrite via Hardlink Path Traversal
Fixed in: 7.5.7
Capabilities
Reads & Writes files
Accesses: TESTING_TAR_FAKE_PLATFORM, USER, __FAKE_FS_O_FILENAME__...