code-annotations

PyPI

Is code-annotations safe to use?

Based on the latest brin safety scan, no vulnerabilities or threats were detected for code-annotations v2.3.0. Trust score: 80/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.

Install (safety-checked)

code-annotations Passed Security Checks

No security concerns detected

clean
CVEs

0

Threats

0

Install Scripts

0

No Concerns Detected

No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.

This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.

code-annotations Capabilities & Permissions

What code-annotations can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.

Filesystem Access

Reads and writes to the filesystem.

site-packages (rw)setup.py (rw).env (rw).env (rw).env (rw)site-packages (rw)/usr/ (rw)/usr/ (rw)+3 more

Process Spawning

This package can spawn child processes.

git

AGENTS.md for code-annotations

Good instructions lead to good results. brin adds code-annotations documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.

brin init

Vercel's research: 100% accuracy with AGENTS.md vs 53% without →

code-annotations Documentation & Source Code

For the full code-annotations README, API documentation, and source code, visit the official package registry.

Frequently asked questions about code-annotations safety

Weekly Downloads

N/A

Version

2.3.0

Last Scanned

Feb 10, 2026

Trust Score

80/100·Legitimacy signals, not safety

Capabilities

Filesystem

Reads & Writes files

Process

Spawns child processes