tensorrt-cu13
PyPIIs tensorrt-cu13 safe to use?
Based on the latest brin safety scan, no vulnerabilities or threats were detected for tensorrt-cu13 v10.15.1.29. Trust score: 80/100. No known CVE vulnerabilities, no detected threat patterns, and no suspicious capabilities identified. This is an automated, point-in-time assessment.
Install (safety-checked)
tensorrt-cu13 Passed Security Checks
No security concerns detected
0
0
0
No Concerns Detected
No security concerns detected in the latest brin assessment. This is an automated, point-in-time evaluation — security posture may change.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
tensorrt-cu13 Capabilities & Permissions
What tensorrt-cu13 can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Filesystem Access
Reads from the filesystem.
Process Spawning
This package can spawn child processes.
Environment Variables
Accesses the following environment variables.
AGENTS.md for tensorrt-cu13
Good instructions lead to good results. brin adds tensorrt-cu13 documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
tensorrt-cu13 Documentation & Source Code
For the full tensorrt-cu13 README, API documentation, and source code, visit the official package registry.
Frequently asked questions about tensorrt-cu13 safety
Install (safety-checked)
Weekly Downloads
Version
10.15.1.29Last Scanned
Trust Score
Capabilities
Reads files
Spawns child processes
Accesses: DISABLE_INTERNAL_PIP_FLAG, NVIDIA_PIP_INDEX_URL