aim
PyPIIs aim safe to use?
Based on the latest brin safety scan, no vulnerabilities or threats were detected for aim v3.29.1. Trust score: 60/100. 2 known CVEs, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.
Install (safety-checked)
aim Passed Security Checks
No security concerns detected
2
0
0
Risk Indicators
- •GHSA-gmvv-rj92-9w35: UNKNOWN
- •GHSA-gp5h-f9c5-8355: UNKNOWN
aim CVE Vulnerabilities (2)
Aim vulnerable to Cross-site Scripting
Aim Vulnerable to Sandbox Escape Leading to Remote Code Execution
No Concerns Detected
No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
aim Capabilities & Permissions
What aim can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Network Access
This package makes network requests.
Filesystem Access
Reads and writes to the filesystem.
Process Spawning
This package can spawn child processes.
Environment Variables
Accesses the following environment variables.
Native Modules
Contains native code that runs outside the JavaScript sandbox.
AGENTS.md for aim
Good instructions lead to good results. brin adds aim documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
aim Documentation & Source Code
For the full aim README, API documentation, and source code, visit the official package registry.
Frequently asked questions about aim safety
Install (safety-checked)
Weekly Downloads
Version
3.29.1Last Scanned
Trust Score
CVEs (2)
Aim vulnerable to Cross-site Scripting
Aim Vulnerable to Sandbox Escape Leading to Remote Code Execution
Capabilities
Connects to: aimstack.readthedocs.io, alembic.zzzcomputing.com, github.com...
Reads & Writes files
Spawns child processes
Accesses: AIM_CLIENT_QUEUE_MAX_MEMORY, AIM_CLIENT_SSL_CERTIFICATES_FILE, AIM_ENABLE_TRACKING_THREAD...
Contains native modules