Is Credential Provider Login Safe?

Credential Provider Login — Nerq Trust Score 66.7/100 (B- grade). Based on analysis of 2 trust dimensions, it is generally safe but has some concerns. Last updated: 2026-04-01.

Use Credential Provider Login with some caution. Credential Provider Login is a Node.js package with a Nerq Trust Score of 66.7/100 (B-), based on 3 independent data dimensions. It is below the recommended threshold of 70. Security: 80/100. Popularity: 95/100. Data sourced from npm registry, GitHub repository, NVD, OSV.dev, and OpenSSF Scorecard. Last updated: 2026-04-01. Machine-readable data (JSON).

Is Credential Provider Login safe?

CAUTION — Credential Provider Login has a Nerq Trust Score of 66.7/100 (B-). It has moderate trust signals but shows some areas of concern that warrant attention. Suitable for development use — review security and maintenance signals before production deployment.

Security Analysis → {name} Privacy Report →

What is Credential Provider Login's trust score?

Credential Provider Login has a Nerq Trust Score of 66.7/100, earning a B- grade. This score is based on 2 independently measured dimensions including security, maintenance, and community adoption.

Security
80
Popularity
95

What are the key security findings for Credential Provider Login?

Credential Provider Login's strongest signal is popularity at 95/100. No known vulnerabilities have been detected. It has not yet reached the Nerq Verified threshold of 70+.

Security score: 80/100 (strong)
Popularity: 95/100 — community adoption

What is Credential Provider Login and who maintains it?

Authoramzn-oss
Categorynpm
SourceN/A

Similar Npm by Trust Score

babel-plugin-jest-hoist (74)@smithy/util-stream (74)@aws-sdk/middleware-bucket-endpoint (74)@aws-sdk/middleware-ssec (74)@aws-sdk/middleware-location-constraint (74)
See all safest Npm →

Safety Guide: Credential Provider Login

What is Credential Provider Login?

Credential Provider Login is a Node.js package — AWS credential provider that sources credentials from aws login cached tokens.

How to Verify Safety

Run npm audit to check for vulnerabilities. Review the package's GitHub repository for recent commits.

You can also check the trust score via API: GET /v1/preflight?target=@aws-sdk/credential-provider-login

Key Safety Concerns for Node.js packages

When evaluating any Node.js package, watch for: dependency vulnerabilities, malicious packages, typosquatting.

Trust Assessment

Credential Provider Login has a Nerq Trust Score of 67/100 (B-) and has not yet reached Nerq trust threshold (70+). This score is based on automated analysis of security, maintenance, community, and quality signals.

Key Takeaways

Detailed Score Analysis

DimensionScore
Security80/100
Privacy80/100
Reliability90/100
Transparency85/100
Maintenance60/100

Based on 5 dimensions. Data from npm registry, GitHub repository, NVD, OSV.dev, and OpenSSF Scorecard.

What data does Credential Provider Login collect?

Credential Provider Login is a Node.js package maintained by amzn-oss. It receives approximately 21,547,838 weekly downloads. Licensed under Apache-2.0.

As a development package, Credential Provider Login does not directly collect end-user personal data. However, applications built with it may collect data depending on implementation. Privacy score: 80/100.

Review the package's dependencies for potential supply chain risks. Run your package manager's audit command regularly.

Full analysis: Credential Provider Login Privacy Report · Privacy review

Is Credential Provider Login secure?

Security score: 80/100. Credential Provider Login has 0 known vulnerabilities (CVEs) in the National Vulnerability Database. This is a clean record.

Licensed under Apache-2.0, allowing code inspection. Open-source packages allow independent security review of the source code.

Run your package manager's audit command (`npm audit`, `pip audit`, `cargo audit`) to check for known vulnerabilities in your dependency tree.

Full analysis: Credential Provider Login Security Report

How we calculated this score

Credential Provider Login's trust score of 66.7/100 (B-) is computed from npm registry, GitHub repository, NVD, OSV.dev, and OpenSSF Scorecard. The score reflects 5 independent dimensions: security (80/100), privacy (80/100), reliability (90/100), transparency (85/100), maintenance (60/100). Each dimension is weighted equally to produce the composite trust score.

Nerq analyzes over 7.5 million entities across 26 registries using the same methodology, enabling direct cross-entity comparison. Scores are updated continuously as new data becomes available.

This page was last reviewed on April 01, 2026. Data version: 1.0.

Full methodology documentation · Machine-readable data (JSON API)

Frequently Asked Questions

Is Credential Provider Login safe to use?
Use with some caution. @aws-sdk/credential-provider-login has a Nerq Trust Score of 66.7/100 (B-). Strongest signal: popularity (95/100). Score based on security (80/100), popularity (95/100).
What is Credential Provider Login's trust score?
@aws-sdk/credential-provider-login: 66.7/100 (B-). Score based on: security (80/100), popularity (95/100). Scores update as new data becomes available. API: GET nerq.ai/v1/preflight?target=@aws-sdk/credential-provider-login
What are safer alternatives to Credential Provider Login?
In the npm category, more Node.js packages are being analyzed — check back soon. @aws-sdk/credential-provider-login scores 66.7/100.
Does Credential Provider Login have known vulnerabilities?
Nerq checks Credential Provider Login against NVD, OSV.dev, and registry-specific vulnerability databases. Current security score: 80/100. Run your package manager's audit command for the latest findings.
How actively maintained is Credential Provider Login?
Credential Provider Login has a trust score of 66.7/100 (B-). Below Nerq Verified threshold — conduct additional review.
API: /v1/preflight Trust Badge API Docs

Disclaimer: Nerq trust scores are automated assessments based on publicly available signals. They are not endorsements or guarantees. Always conduct your own due diligence.

We use cookies for analytics and caching. Privacy Policy