django-dirtyfields

PyPI

Is django-dirtyfields safe to use?

Based on the latest brin safety scan, no vulnerabilities or threats were detected for django-dirtyfields v1.9.9. Trust score: 90/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.

Install (safety-checked)

django-dirtyfields Passed Security Checks

No security concerns detected

clean
CVEs

0

Threats

0

Install Scripts

0

No Concerns Detected

No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.

This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.

django-dirtyfields Capabilities & Permissions

What django-dirtyfields can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.

Filesystem Access

Reads and writes to the filesystem.

Environment Variables

Accesses the following environment variables.

POSTGRES_PASSWORDPOSTGRES_USERTEST_DATABASETOX_ENV_NAME

AGENTS.md for django-dirtyfields

Good instructions lead to good results. brin adds django-dirtyfields documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.

brin init

Vercel's research: 100% accuracy with AGENTS.md vs 53% without →

django-dirtyfields Documentation & Source Code

For the full django-dirtyfields README, API documentation, and source code, visit the official package registry.

Frequently asked questions about django-dirtyfields safety

Weekly Downloads

N/A

Version

1.9.9

Last Scanned

Feb 10, 2026

Trust Score

90/100·Legitimacy signals, not safety

Capabilities

Filesystem

Reads & Writes files

Environment

Accesses: POSTGRES_PASSWORD, POSTGRES_USER, TEST_DATABASE...