python-cursorrules
Provides Cursor IDE rules for Python development with guidance on project structure, testing, type hints, virtual environments, and code style enforcement.
85
/ 100 · Grade B
B = 80–89
“I need to configure Cursor IDE with comprehensive Python development rules that enforce best practices for project structure, testing, type safety, and code style.”
python-cursorrules earned Certified status with a trust score of 85/100 (Grade B). No adversarial findings — all attack patterns were handled gracefully. Security scan flagged 0 findings.
Trust Score Breakdown
Eight weighted signals composing the aggregate trust score
Scheme v2.0 · Weights provisional · Consumer confirmations and uptime use pipeline-derived baselines.
Findings
Security scan results, adversarial testing, and pipeline review
Security Scan — Cisco Skill Scanner
Adversarial Testing — 3 categories, 0 findings
No adversarial findings — all attack patterns handled gracefully.
Methodology v1.0 · 3 categories · ~55 attack patterns
Behavioral Fingerprint
Runtime performance baseline for drift detection
Samples
8
Error rate
0.0%
Peak memory
— MB
Avg CPU
—%
Response time distribution
Output size distribution
Fingerprint v1.0 · Baseline: Mar 28, 2026 · Status: baseline
Interface
Skill triggers and instruction summary
Activation
This skill activates when a user requests guidance on Python project structure, development practices, or AI-friendly coding patterns.
This skill handles Python project organization, development workflows, testing strategies, and code quality practices.
Does
Promotes modular project structure with separate directories for source, tests, docs, and config
Advocates for comprehensive error handling and logging practices
Encourages use of type hints and descriptive naming conventions
Recommends pytest for testing and Ruff for code style consistency
Supports dependency management using uv and virtual environments
Provides guidance on CI/CD implementation with GitHub Actions or GitLab CI
Generates AI-friendly code with detailed comments and rich error context
Does not
Does not provide guidance for non-Python languages
Does not recommend deprecated Python practices
Does not suggest bypassing proper testing or documentation
Scope & Permissions
What this capability can and cannot access — derived from pipeline analysis
yes
no
yes
yes
yes
no
Known Failure Modes
Documented edge cases and recovery behaviors
when when asked about non-Python development
then the agent redirects to Python-specific alternatives or declines
when when project structure conflicts with best practices
then the agent suggests refactoring to align with modular design principles
Badge & Integration
Embed certification status in your README, docs, or CI pipeline
Certification Notes
Provenance observations from the pipeline
Publisher "PatrickJS" is not verified — first certification from this publisher
No SECURITY.md or SECURITY.txt file found — no published vulnerability reporting process
Single contributor — no peer review evidence in commit history
Package description appears to be boilerplate or template text
Signed Artifact
Certification provenance and verification metadata
Pipeline Artifacts
Raw data files from this certification run — downloadable for independent verification
contract.json
Full unsigned contract
stage1-ingest.json
Ingest stage output
stage2a-sbom.json
SBOM generation results
stage2a-vulns.json
Vulnerability scan results
stage2b-security.json
Security scan results
stage3a-functional.json
Functional test results
stage3b-adversarial.json
Adversarial test results
stage3c-fingerprint.json
Behavioral fingerprint
stage4-certify.json
Certification decision + trust score
stage3a-measurements.json
Raw functional test measurements
stage3b-measurements.json
Raw adversarial test measurements
run-log.json
Pipeline execution log
Not all files may be present for every certification.