Narrative
Critical dependencies deserve visible trust
Critical but under-signaled dependency that agents should not trust blindly.
View GitHub repoLegacy risk
The repo is everywhere, but market depth and formal coverage still look too shallow for the blast radius it carries.
Operator Scenarios
Live now
Injects a critical incident into a fast-growth repo and flips the agent verdict from review to block.
Available
Shows how increasing the security budget and audit coverage can move a high-growth repo into the allow range.
Available
Demonstrates that operational discipline can rehabilitate a legacy dependency's trust profile.
Narrative
Critical but under-signaled dependency that agents should not trust blindly.
View GitHub repoSignal composition
Security Budget
47Stake Depth
42Audit Coverage
58Maintainer Responsiveness
61Incident Pressure
44Adoption Confidence
92Agent Verdict
Trust and security signals are too weak for autonomous use without stronger audit coverage or market backing.
Threshold 74Provenance
Real repo with explicit seeded signals to illustrate systemic risk.
Source linkRecent events
Maintainer queue drifted upward
Mar 9, 2026, 10:45 AMSlower response times pushed the repo further into review territory.