ip2proxy
PyPIIs ip2proxy safe to use?
Based on the latest brin safety scan, no vulnerabilities or threats were detected for ip2proxy v3.6.0. Trust score: 85/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.
Install (safety-checked)
ip2proxy Passed Security Checks
No security concerns detected
0
0
0
No Concerns Detected
No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
ip2proxy Capabilities & Permissions
What ip2proxy can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Network Access
This package makes network requests.
Filesystem Access
Reads from the filesystem.
Native Modules
Contains native code that runs outside the JavaScript sandbox.
AGENTS.md for ip2proxy
Good instructions lead to good results. brin adds ip2proxy documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
ip2proxy Documentation & Source Code
For the full ip2proxy README, API documentation, and source code, visit the official package registry.
Frequently asked questions about ip2proxy safety
Install (safety-checked)
Weekly Downloads
Version
3.6.0Last Scanned
Trust Score
Capabilities
Connects to: github.com, www.gnu.org
Reads files
Contains native modules