django-user-accounts

PyPI

Is django-user-accounts safe to use?

Based on the latest brin safety scan, no vulnerabilities or threats were detected for django-user-accounts v3.3.2. Trust score: 85/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.

Install (safety-checked)

django-user-accounts Passed Security Checks

No security concerns detected

clean
CVEs

0

Threats

0

Install Scripts

0

No Concerns Detected

No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.

This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.

django-user-accounts Capabilities & Permissions

What django-user-accounts can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.

Network Access

This package makes network requests.

stackoverflow.com
Protocols: https

Filesystem Access

Reads from the filesystem.

/usr/ (r)/usr/ (r).env (r)/usr/ (r).env (r)

AGENTS.md for django-user-accounts

Good instructions lead to good results. brin adds django-user-accounts documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.

brin init

Vercel's research: 100% accuracy with AGENTS.md vs 53% without →

django-user-accounts Documentation & Source Code

For the full django-user-accounts README, API documentation, and source code, visit the official package registry.

Frequently asked questions about django-user-accounts safety

Weekly Downloads

19.6K

Version

3.3.2

Last Scanned

Feb 11, 2026

Trust Score

85/100·Legitimacy signals, not safety

Capabilities

Network

Connects to: stackoverflow.com

Filesystem

Reads files