esptool
PyPIIs esptool safe to use?
The latest brin safety scan flagged esptool v5.2.0 with risk indicators that warrant review. 1 known CVE vulnerability and 1 detected threat pattern, including patterns consistent with code injection. Trust score: 90/100. Review the findings below before use. This is an automated assessment and may contain errors.
Install (safety-checked)
esptool Has Confirmed Threats
Confirmed threat patterns detected in this package
1
1
0
Risk Indicators
- •PYSEC-2023-234: UNKNOWN
esptool Confirmed Threats (1)
Location: esptool/reset.py:198
exec(self.constructed_strategy)esptool CVE Vulnerabilities (1)
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.
brin Recommendations
- →This package is assessed as high-risk. Manual review is strongly recommended before use.
- →1 verified threat pattern detected. Review the specific findings and consider alternatives.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
esptool Capabilities & Permissions
What esptool can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Network Access
This package makes network requests.
Filesystem Access
Reads and writes to the filesystem.
Environment Variables
Accesses the following environment variables.
Native Modules
Contains native code that runs outside the JavaScript sandbox.
AGENTS.md for esptool
Good instructions lead to good results. brin adds esptool documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
esptool Documentation & Source Code
For the full esptool README, API documentation, and source code, visit the official package registry.
Frequently asked questions about esptool safety
Install (safety-checked)
Weekly Downloads
Version
5.2.0License
MITOther Versions
Last Scanned
Trust Score
CVEs (1)
An issue discovered in esptool 4.6.2 allows attackers to view sensitive information via weak cryptographic algorithm.
Confirmed Threats (1)
Location: esptool/reset.py:198
Confidence: 90%
exec(self.constructed_strategy)Confirmed threats have been validated by human review and represent real risks.
Capabilities
Connects to: docs.espressif.com, github.com, tools.ietf.org
Reads & Writes files
Accesses: , ESPTOOL_AFTER, ESPTOOL_BAUD...
Contains native modules