Mar 4, 2026 at 4:55 AM 6 signals analysed No manual reviews · fully automatedTrust Signal Breakdown unverified 23 sub-signals across 6 dimensions
Vulnerability & Safety ×0.25 0.0 CVEs, dependency health, and supply chain integrity
0 of 3 sub-signals with data
Known CVEs no data —
Weight redistributed to sub-signals with data
Dependency Health no data —
Weight redistributed to sub-signals with data
Supply Chain no data —
Weight redistributed to sub-signals with data
Operational Reliability ×0.15 0.0 Uptime, latency, error rates, and incident history
0 of 4 sub-signals with data
Uptime no data —
Weight redistributed to sub-signals with data
Response Latency no data —
Weight redistributed to sub-signals with data
Error Rate no data —
Weight redistributed to sub-signals with data
Incident History no data —
Weight redistributed to sub-signals with data
Maintenance Activity ×0.15 0.0 Commit recency, release cadence, issue response, CI/CD
0 of 4 sub-signals with data
Commit Recency no data —
Weight redistributed to sub-signals with data
Release Cadence no data —
Weight redistributed to sub-signals with data
Issue Response no data —
Weight redistributed to sub-signals with data
CI/CD Presence no data —
Weight redistributed to sub-signals with data
Adoption ×0.15 0.0 Downloads, stars, dependents, and growth trajectory
0 of 4 sub-signals with data
Download Volume no data —
Weight redistributed to sub-signals with data
GitHub Stars no data —
Weight redistributed to sub-signals with data
Dependent Packages no data —
Weight redistributed to sub-signals with data
Growth Trend no data —
Weight redistributed to sub-signals with data
Transparency ×0.15 0.0 License, documentation, security policy, changelog
0 of 4 sub-signals with data
Open Source no data —
Weight redistributed to sub-signals with data
Documentation no data —
Weight redistributed to sub-signals with data
Security Policy no data —
Weight redistributed to sub-signals with data
Changelog no data —
Weight redistributed to sub-signals with data
Publisher Trust ×0.15 0.0 Track record, org maturity, community standing
0 of 4 sub-signals with data
Track Record no data —
Weight redistributed to sub-signals with data
Org Maturity no data —
Weight redistributed to sub-signals with data
Community Standing no data —
Weight redistributed to sub-signals with data
Cross-Platform no data —
Weight redistributed to sub-signals with data
Limited data available — 6 of 6 signals pending evaluation
About this scoreScored across 23 sub-signals in 6 dimensions Scoring engine v1 (beta) — actively being expanded Phase 1: Core sub-signal architecture (live) Phase 2: Permission scope & expanded collection (in progress)
Trust Assessment AI Assessment
Xmloxide is a Rust-based XML parser by jawiggins with unknown licensing, positioned as a libxml2 replacement. All trust signals score zero, indicating absent or insufficient data across vulnerability tracking, maintenance activity, adoption metrics, and publisher verification. This service is blocked due to lack of verifiable trust indicators and missing basic documentation including a README file.
Generated by Fabric AI · Mar 4, 2026 at 4:55 AM
Incidents & Alerts last 90 days
Data Sources 6 indexed
◎
OSV.dev CVE database · vulnerability scanning for npm & PyPI packages
◈
GitHub API Commits, issues, releases, repo metadata, transparency checks
⬡
npm Registry Package metadata, weekly downloads, maintainers, dependencies
⬡
PyPI Package metadata, weekly downloads, dependency tree
△
HTTP Health Checks 15-min pings · uptime, latency, status monitoring
◎
PyPI Stats Download statistics and trends
Are you the publisher? Claim this profile to unlock deeper evaluation, real-time monitoring, and trust signals that help agents discover your service.
Claim Provider Report Issue
Share this Trust Score Generate a scorecard image optimised for X, LinkedIn and other social platforms.
⬇ Download Score Card