RepoPilotOpen in app →

Devolutions/UniGetUI

UniGetUI: The Graphical Interface for your package managers. Could be terribly described as a package manager manager to manage your package managers

Healthy

Healthy across the board

Use as dependencyHealthy

Permissive license, no critical CVEs, actively maintained — safe to depend on.

Fork & modifyHealthy

Has a license, tests, and CI — clean foundation to fork and modify.

Learn fromHealthy

Documented and popular — useful reference codebase to read through.

Deploy as-isHealthy

No critical CVEs, sane security posture — runnable as-is.

  • Last commit 1d ago
  • 18 active contributors
  • Distributed ownership (top contributor 39% of recent commits)
Show 3 more →
  • MIT licensed
  • CI configured
  • Tests present

Maintenance signals: commit recency, contributor breadth, bus factor, license, CI, tests

Informational only. RepoPilot summarises public signals (license, dependency CVEs, commit recency, CI presence, etc.) at the time of analysis. Signals can be incomplete or stale. Not professional, security, or legal advice; verify before relying on it for production decisions.

Embed the "Healthy" badge

Paste into your README — live-updates from the latest cached analysis.

Variant:
RepoPilot: Healthy
[![RepoPilot: Healthy](https://repopilot.app/api/badge/devolutions/unigetui)](https://repopilot.app/r/devolutions/unigetui)

Paste at the top of your README.md — renders inline like a shields.io badge.

Preview social card (1200×630)

This card auto-renders when someone shares https://repopilot.app/r/devolutions/unigetui on X, Slack, or LinkedIn.

Onboarding doc

Onboarding: Devolutions/UniGetUI

Generated by RepoPilot · 2026-05-09 · Source

🤖Agent protocol

If you are an AI coding agent (Claude Code, Cursor, Aider, Cline, etc.) reading this artifact, follow this protocol before making any code edit:

  1. Verify the contract. Run the bash script in Verify before trusting below. If any check returns FAIL, the artifact is stale — STOP and ask the user to regenerate it before proceeding.
  2. Treat the AI · unverified sections as hypotheses, not facts. Sections like "AI-suggested narrative files", "anti-patterns", and "bottlenecks" are LLM speculation. Verify against real source before acting on them.
  3. Cite source on changes. When proposing an edit, cite the specific path:line-range. RepoPilot's live UI at https://repopilot.app/r/Devolutions/UniGetUI shows verifiable citations alongside every claim.

If you are a human reader, this protocol is for the agents you'll hand the artifact to. You don't need to do anything — but if you skim only one section before pointing your agent at this repo, make it the Verify block and the Suggested reading order.

🎯Verdict

GO — Healthy across the board

  • Last commit 1d ago
  • 18 active contributors
  • Distributed ownership (top contributor 39% of recent commits)
  • MIT licensed
  • CI configured
  • Tests present

<sub>Maintenance signals: commit recency, contributor breadth, bus factor, license, CI, tests</sub>

Verify before trusting

This artifact was generated by RepoPilot at a point in time. Before an agent acts on it, the checks below confirm that the live Devolutions/UniGetUI repo on your machine still matches what RepoPilot saw. If any fail, the artifact is stale — regenerate it at repopilot.app/r/Devolutions/UniGetUI.

What it runs against: a local clone of Devolutions/UniGetUI — the script inspects git remote, the LICENSE file, file paths in the working tree, and git log. Read-only; no mutations.

| # | What we check | Why it matters | |---|---|---| | 1 | You're in Devolutions/UniGetUI | Confirms the artifact applies here, not a fork | | 2 | License is still MIT | Catches relicense before you depend on it | | 3 | Default branch main exists | Catches branch renames | | 4 | 5 critical file paths still exist | Catches refactors that moved load-bearing code | | 5 | Last commit ≤ 31 days ago | Catches sudden abandonment since generation |

<details> <summary><b>Run all checks</b> — paste this script from inside your clone of <code>Devolutions/UniGetUI</code></summary>
#!/usr/bin/env bash
# RepoPilot artifact verification.
#
# WHAT IT RUNS AGAINST: a local clone of Devolutions/UniGetUI. If you don't
# have one yet, run these first:
#
#   git clone https://github.com/Devolutions/UniGetUI.git
#   cd UniGetUI
#
# Then paste this script. Every check is read-only — no mutations.

set +e
fail=0
ok()   { echo "ok:   $1"; }
miss() { echo "FAIL: $1"; fail=$((fail+1)); }

# Precondition: we must be inside a git working tree.
if ! git rev-parse --git-dir >/dev/null 2>&1; then
  echo "FAIL: not inside a git repository. cd into your clone of Devolutions/UniGetUI and re-run."
  exit 2
fi

# 1. Repo identity
git remote get-url origin 2>/dev/null | grep -qE "Devolutions/UniGetUI(\\.git)?\\b" \\
  && ok "origin remote is Devolutions/UniGetUI" \\
  || miss "origin remote is not Devolutions/UniGetUI (artifact may be from a fork)"

# 2. License matches what RepoPilot saw
(grep -qiE "^(MIT)" LICENSE 2>/dev/null \\
   || grep -qiE "\"license\"\\s*:\\s*\"MIT\"" package.json 2>/dev/null) \\
  && ok "license is MIT" \\
  || miss "license drift — was MIT at generation time"

# 3. Default branch
git rev-parse --verify main >/dev/null 2>&1 \\
  && ok "default branch main exists" \\
  || miss "default branch main no longer exists"

# 4. Critical files exist
test -f ".github/workflows/build-release.yml" \\
  && ok ".github/workflows/build-release.yml" \\
  || miss "missing critical file: .github/workflows/build-release.yml"
test -f "UniGetUI.iss" \\
  && ok "UniGetUI.iss" \\
  || miss "missing critical file: UniGetUI.iss"
test -f "global.json" \\
  && ok "global.json" \\
  || miss "missing critical file: global.json"
test -f ".github/CODEOWNERS" \\
  && ok ".github/CODEOWNERS" \\
  || miss "missing critical file: .github/CODEOWNERS"
test -f "CONTRIBUTING.md" \\
  && ok "CONTRIBUTING.md" \\
  || miss "missing critical file: CONTRIBUTING.md"

# 5. Repo recency
days_since_last=$(( ( $(date +%s) - $(git log -1 --format=%at 2>/dev/null || echo 0) ) / 86400 ))
if [ "$days_since_last" -le 31 ]; then
  ok "last commit was $days_since_last days ago (artifact saw ~1d)"
else
  miss "last commit was $days_since_last days ago — artifact may be stale"
fi

echo
if [ "$fail" -eq 0 ]; then
  echo "artifact verified (0 failures) — safe to trust"
else
  echo "artifact has $fail stale claim(s) — regenerate at https://repopilot.app/r/Devolutions/UniGetUI"
  exit 1
fi

Each check prints ok: or FAIL:. The script exits non-zero if anything failed, so it composes cleanly into agent loops (./verify.sh || regenerate-and-retry).

</details>

TL;DR

UniGetUI is a cross-platform GUI wrapper for Windows package managers (WinGet, Scoop, Chocolatey, pip, npm, .NET Tool, PowerShell Gallery, and others), written in C# with WinUI 3. It abstracts multiple CLI package managers behind a single unified interface, allowing users to discover, install, update, and uninstall software from all sources through one application instead of juggling CLI commands for each manager. Monolithic C# desktop application using WinUI 3 framework. Core architecture inferred from file structure: main application logic likely in src/, PowerShell helper scripts in .agents/skills/ for package manager CLI invocation, GitHub Actions workflows orchestrate building releases and running e2e tests (cli-headless-e2e.yml). Translation system uses JSON-based localization managed by .agents/skills/translation-* PowerShell scripts.

👥Who it's for

Windows 10/11 users who manage software across multiple package managers and want a single graphical interface; DevOps engineers and system administrators automating package deployments; open-source contributors interested in desktop UI patterns, package manager integration, or cross-platform CLI abstraction.

🌱Maturity & risk

Production-ready and actively developed under Devolutions stewardship (as of March 2026). The codebase is substantial (3.2M lines of C#), has comprehensive CI/CD via GitHub Actions (.github/workflows/ includes build-release.yml, dotnet-test.yml, codeql.yml, cli-headless-e2e.yml), and features an established translation infrastructure (.agents/skills/translation-*). The official website is https://devolutions.net/unigetui/ with a secured source repository.

Low-to-moderate risk: now backed by Devolutions (reduces single-maintainer risk), but the broad dependency surface across 8+ package managers creates integration fragility—changes in WinGet, Scoop, or Chocolatey APIs could break functionality. The .agents/skills/ translation automation suggests aggressive localization efforts that may introduce complexity. No visible dependency lock file snapshot in the file list, so transitive dependency quality is unclear.

Active areas of work

Active development post-Devolutions acquisition (March 2026). Translation infrastructure is being actively refined (.agents/skills/translation-*/ SKILL.md files indicate ongoing localization work). Build automation and testing are robust (dotnet-test.yml, codeql.yml enabled). No specific PR data visible in file list, but .github/renovate.json and .github/dependabot.yml indicate dependency management automation is active.

🚀Get running

Clone the repository: git clone https://github.com/Devolutions/UniGetUI.git && cd UniGetUI. Then open the .sln file in Visual Studio 2022+ (a C# desktop WinUI 3 project) and build via dotnet build. Install required .NET SDK (version inferred from csproj files not shown but likely .NET 6+). Run tests with dotnet test.

Daily commands: Open UniGetUI.sln in Visual Studio 2022+, then press F5 or use dotnet run --project src/UniGetUI.csproj. For CLI headless testing (per cli-headless-e2e.yml), likely dotnet run --project src/UniGetUI.Cli/UniGetUI.Cli.csproj -- [args]. For release builds: dotnet publish -c Release.

🗺️Map of the codebase

  • .github/workflows/build-release.yml — Defines the release build pipeline—every contributor must understand how artifacts are packaged and deployed
  • UniGetUI.iss — Main Inno Setup installer script; core entry point for Windows distribution and deployment
  • global.json — Specifies .NET SDK version and constraints; essential for local build environment setup
  • .github/CODEOWNERS — Defines code ownership and review responsibilities; critical for PR workflow and accountability
  • CONTRIBUTING.md — Documents contribution standards, coding conventions, and development workflow—required reading for all contributors
  • .deepsource.toml — Configures static analysis and code quality checks that run on every commit
  • .github/workflows/dotnet-test.yml — Defines test execution pipeline; shows how unit and integration tests are validated

🛠️How to make changes

Add a new package manager source integration

  1. Create a new source plugin class implementing the package manager protocol (typically inherits from base package provider) (src/UniGetUI.Core/Services/PackageManagerService.cs (inferred))
  2. Register the new source in the service DI container and factory pattern (src/UniGetUI.Core/Services (inferred))
  3. Add CLI handler for the source via IPC protocol (docs/IPC.md)
  4. Create unit tests for the new provider (.github/workflows/dotnet-test.yml (validates test runs))
  5. Add localization keys for new source name/description in main language file (.agents/skills/translation-source-sync (update language boundaries))
  6. Update README or docs if adding a major new manager type (README.md)

Add a new UI feature or page

  1. Create XAML page and code-behind following existing WinUI3 patterns (src/UniGetUI.Core (inferred structure))
  2. Register page in shell/navigation service for routing (src/UniGetUI.Core/Services (inferred))
  3. Add localization strings for UI labels/tooltips (.agents/skills/translation-source-sync/scripts/sync-translation-sources.ps1)
  4. Add E2E test coverage for new page interaction (.github/workflows/cli-headless-e2e.yml)
  5. Export translation diff for contractor review (.agents/skills/translation-diff-export/scripts/export-translation-diff.ps1)

Add or update a localization language

  1. Export current translation boundary and source strings (.agents/skills/translation-source-sync/scripts/set-translation-boundary-order.ps1)
  2. Create language JSON file with translated strings following validation schema (.agents/skills/translation-diff-import/scripts/validate-language-file.ps1)
  3. Import translated strings via diff tool (.agents/skills/translation-diff-import/scripts/import-translation-diff.ps1)
  4. Review translated content for consistency and accuracy (.agents/skills/translation-review/scripts/review-translation-json.ps1)
  5. Validate against build pipeline (.github/workflows/translation-validation.yml)

Modify installer behavior or dependencies

  1. Edit Inno Setup installer script with new sections, checks, or tasks (UniGetUI.iss)
  2. If adding redistributable dependencies, update include file (InstallerExtras/CodeDependencies.iss)
  3. If modifying MSI wrapper, update Visual Studio project (InstallerExtras/MsiCreator/MsiInstallerWrapper.vdproj)
  4. Test installer build in release pipeline (.github/workflows/build-release.yml)

🔧Why these technologies

  • .NET (C#) with WinUI3 — Modern Windows desktop framework with XAML for native UI, strong Windows integration, and cross-architecture support (x86/x64)
  • Inno Setup (ISS) + MSI wrapper — Lightweight, portable installer for Windows; MSI wrapper provides enterprise deployment compatibility and Group Policy support
  • PowerShell automation scripts — Native Windows scripting for build orchestration, translation workflows, and installer generation; tight OS integration
  • JSON-based configuration and localization — Human-readable, versionable, enables declarative translation management and structured metadata handoff to contractors
  • GitHub Actions CI/CD — Integrated with repo, free tier, native OIDC signing support, and seamless artifact management for releases

⚖️Trade-offs already made

  • Centralized installer generation via Inno Setup rather than per-architecture builds

    • Why: Simplifies release pipeline and reduces build time; single installer can target multiple architectures
    • Consequence: Requires runtime architecture detection; portable mode must handle path assumptions
  • Translation via external contractor + JSON diff tools rather than embedded translation service

    • Why: Cost-effective, human-quality output, decouples from application runtime
    • Consequence: Requires manual validation workflow; translation lag when new strings are added; diff export/import complexity
  • CLI headless mode via IPC protocol instead of full subprocess isolation

    • Why: Enables shared state and faster operations for batch scripting
    • Consequence: IPC protocol must be carefully versioned; headless and GUI modes must remain in sync
  • Single-source repository for both GUI and CLI rather than separate codebases

    • Why: Avoids code duplication, ensures feature parity, shared package manager integrations
    • Consequence: Larger CI/CD matrix; risk of UI changes breaking CLI; single point of failure

🚫Non-goals (don't propose these)

  • Does not run on non-Windows platforms (Windows-first design; macOS/Linux not supported

🪤Traps & gotchas

WinUI 3 SDK requirement: Must have Windows 10 21H2+ or Windows 11 and Visual Studio 2022 17.0+ with WinUI 3 workload installed—development on older Windows or Linux is not straightforward. Package manager availability: The codebase assumes certain package managers (WinGet, Scoop, Chocolatey, etc.) are installed or their CLIs are available in PATH for testing; e2e tests may fail if tools are missing. PowerShell execution policy: Translation and build scripts in .agents/skills/ require PowerShell execution policy to permit script running (may need Set-ExecutionPolicy bypass locally). Localization workflow complexity: Adding a new language requires running multiple PowerShell scripts in .agents/skills/translation-* in specific order; missing a step breaks the JSON structure (validate with validate-language-file.ps1).

🏗️Architecture

💡Concepts to learn

  • Package Manager Abstraction / Facade Pattern — UniGetUI's core design—it wraps 8+ different CLI tools with incompatible argument syntaxes behind a unified interface; understanding the abstraction layer is key to adding new managers or fixing integration bugs.
  • CLI Parsing & Output Capture — UniGetUI invokes external CLI tools (WinGet, Scoop, etc.) as subprocesses and parses their text/JSON output; fragility here causes user-visible bugs when tool versions change.
  • WinUI 3 & XAML — The UI framework used for UniGetUI; XAML data binding, event handling, and async patterns are essential for building responsive Windows 10/11 applications.
  • Localization & JSON-based Translation Catalogs — UniGetUI supports 50+ languages via the elaborate .agents/skills/translation-* system; understanding JSON schema validation, diff exports, and boundary ordering is needed to maintain translations.
  • GitHub Actions CI/CD Orchestration — Build, test, and release pipelines are automated in .github/workflows/; understanding how build-release.yml, dotnet-test.yml, and cli-headless-e2e.yml interact is critical for reliable deployments.
  • PowerShell as a Build/Deployment Language — The .agents/skills/ folder uses PowerShell scripts extensively for CLI tool invocation, JSON manipulation, and workflow automation; Windows-specific scripting knowledge is needed.
  • Subprocess Lifetime Management & Graceful Shutdown — UniGetUI spawns package manager CLIs that may hang or take time; proper process timeout, cancellation token, and resource cleanup patterns prevent UI freezes and orphaned processes.
  • microsoft/winget-cli — The canonical Windows Package Manager (WinGet) CLI that UniGetUI wraps; understanding its command structure and output format is essential for maintaining the integration.
  • ScoopInstaller/Scoop — Another major package manager backend that UniGetUI abstracts; key for testing cross-manager compatibility and resolving Scoop-specific parsing issues.
  • microsoft/WinUI-Gallery — Official WinUI 3 component showcase; useful reference for UI patterns and best practices since UniGetUI uses WinUI 3 as its framework.
  • Devolutions/Power-Fx — Related Devolutions project using similar C# desktop patterns; may share architectural insights or code review standards within the organization.

🪄PR ideas

To work on one of these in Claude Code or Cursor, paste: Implement the "<title>" PR idea from CLAUDE.md, working through the checklist as the task list.

Add comprehensive unit tests for PowerShell translation skill scripts

The .agents/skills directory contains multiple PowerShell scripts for translation management (export, import, validation, review) but there are no visible test files beyond test-translation-diff.ps1 and test-translation-source-sync.ps1. Adding Pester tests for validate-language-file.ps1, review-translation-json.ps1, and import-translation-diff.ps1 would catch regressions in critical translation workflows and ensure data integrity.

  • [ ] Create .agents/skills/translation-diff-import/tests/import-translation-diff.Tests.ps1 with Pester test cases for edge cases (invalid JSON, missing keys, encoding issues)
  • [ ] Create .agents/skills/translation-review/tests/review-translation-json.Tests.ps1 covering validation rules and error reporting
  • [ ] Create .agents/skills/translation-diff-import/tests/validate-language-file.Tests.ps1 for file format and structure validation
  • [ ] Integrate test execution into .github/workflows/translation-validation.yml to run on PRs

Add GitHub Action workflow for PowerShell script linting and analysis

The .agents/skills directory contains ~10 PowerShell scripts but there's no PSScriptAnalyzer or linting workflow visible in .github/workflows/. This would catch common PowerShell anti-patterns, syntax errors, and maintainability issues before they reach production, especially critical for translation infrastructure used by contributors worldwide.

  • [ ] Create .github/workflows/powershell-lint.yml using PSScriptAnalyzer
  • [ ] Configure PSScriptAnalyzer rules in .agents/skills/.pssa-rules.psd1 tailored to the skill scripts
  • [ ] Set the workflow to run on all PRs modifying files in .agents/skills/
  • [ ] Add step to fail workflow if severity 'Error' or 'Warning' violations found

Create detailed documentation for agent skills architecture and skill creation

The repo has AGENTS.md and CLAUDE.md but no SKILL_DEVELOPMENT.md guide. With 6 distinct skills (.agents/skills/) each containing scripts and SKILL.md files, new contributors lack guidance on the skill structure, how to add new skills, testing requirements, and the relationship between SKILL.md and scripts. This is a barrier to contribution in a key area.

  • [ ] Create .agents/SKILL_DEVELOPMENT.md documenting the skill directory structure and SKILL.md format
  • [ ] Document the PowerShell script conventions used across existing skills (naming, parameters, error handling)
  • [ ] Add a step-by-step example of creating a new skill from .agents/skills/translation-source-sync as a template
  • [ ] Document how skills integrate with GitHub Actions workflows and the .claude/ agent system
  • [ ] Link from CONTRIBUTING.md to this new documentation

🌿Good first issues

  • Add unit tests for new package manager abstraction layer: The .github/workflows/dotnet-test.yml shows tests are run, but many package manager integrations lack dedicated test coverage. Pick one manager (e.g., Scoop) and write xUnit tests covering install/uninstall/update flows in src/Core/PackageManager/Scoop/ or equivalent.
  • Document translation workflow in CONTRIBUTING.md: The .agents/skills/translation-* folders are complex but CONTRIBUTING.md likely lacks step-by-step guides for adding/updating translations. Write a contributor guide explaining how to run import-translation-diff.ps1, validate-language-file.ps1, and sync-translation-sources.ps1 in the right order with examples.
  • Add missing localization strings for new UI dialogs: If a recent UI feature was added (check recent commits), its strings may not be in all 50+ language JSON files. Use .agents/skills/translation-diff-export/scripts/export-translation-diff.ps1 to identify missing keys, then run import-translation-diff.ps1 to backfill stubs for translators.

Top contributors

Click to expand

📝Recent commits

Click to expand
  • 18ac9b4 — Enhance update functionality and logging (#4726) (GabrielDuf)
  • 504a430 — Reduce release package size and clean publish output (#4727) (mamoreau-devolutions)
  • cf78268 — Updated translation and corrected translation failures caused by source code strings (#4721) (StarsShine11904)
  • b4eee26 — Bump the actions-deps group with 2 updates (#4723) (dependabot[bot])
  • e137dc6 — Flatten Windows publish layout and fix restart handoff (#4719) (mamoreau-devolutions)
  • 499f3ba — Warn on WinGet upgrades when installer host changes (#4718) (GabrielDuf)
  • c3908e5 — Add GUI-hosted CLI and IPC automation surface (#4714) (mamoreau-devolutions)
  • 4a086dc — show "UniGetUI" in menu bar instead of "Avalonia Application" (#4715) (GabrielDuf)
  • 963e994 — Fix: skip version comparison for unparseable hash-based versions (#4710) (ekse)
  • 1a94a40 — Fix two typos (#4709) (ekse)

🔒Security observations

The UniGetUI codebase shows moderate security posture. Primary concerns include incomplete security documentation, potential input validation gaps in PowerShell script processing, and risks inherent to package manager execution. Strengths include use of GitHub security tools (Dependabot, CodeQL), established security reporting channel, and code ownership guidelines. Recommendation: Expand SECURITY.md policy, implement comprehensive input validation across all data processing scripts, and enhance verification of package sources and signatures.

  • Medium · Incomplete Security Policy — SECURITY.md. The SECURITY.md file contains only a vulnerability reporting redirect without details on supported versions, patching timelines, or security update procedures. This lacks clarity on security maintenance commitments. Fix: Expand SECURITY.md to include: supported versions, security update timelines, patching procedures, security best practices for users, and expected response times for vulnerability reports.
  • Medium · Potential PowerShell Script Injection in Translation Processing — .agents/skills/*/scripts/*.ps1. Multiple PowerShell scripts in .agents/skills handle JSON file processing and translation data. These scripts may be vulnerable to injection attacks if they process untrusted input without proper validation/sanitization, particularly in scripts like export-translation-diff.ps1, import-translation-diff.ps1, and sync-translation-sources.ps1. Fix: Implement strict input validation and sanitization for all PowerShell scripts handling external data. Use parameterized operations and avoid dynamic script execution (Invoke-Expression). Add code signing for scripts.
  • Medium · Missing Input Validation in Language File Processing — .agents/skills/translation-diff-import/scripts/validate-language-file.ps1. The validate-language-file.ps1 script may not comprehensively validate JSON structure and content before import, potentially allowing malformed or malicious translation data to be processed. Fix: Implement comprehensive JSON schema validation. Validate all translation keys, values, and encoding. Implement file size limits and reject suspicious patterns.
  • Low · Package Manager Installation Execution — Core package manager integration components. As a package manager UI, the application executes package installation commands from various package managers (winget, etc.). While this is inherent to the functionality, there is potential for supply chain or man-in-the-middle attacks if package sources are not properly verified. Fix: Implement package signature verification, checksums validation, and secure repository pinning. Use HTTPS-only sources. Document security considerations for end-users.
  • Low · Third-party Website Impersonation Risk — README.md, Distribution channels. README warns about fake websites (wingetui.com and unigetui.com) hosted by third parties. This indicates potential phishing/impersonation risks to users downloading from wrong sources. Fix: Implement code signing for releases. Distribute only from official GitHub releases. Register and secure official domains. Add DNSSEC. Monitor for typosquatting domains.
  • Low · Missing Dependency Manifest Information — Dependencies/Package file. The security analysis cannot fully assess third-party dependencies as the dependency file content was not provided. This prevents validation of known vulnerabilities in dependencies. Fix: Provide full dependency manifests (packages.config, .csproj files, etc.). Implement automated dependency scanning with tools like Dependabot (already configured in .github/dependabot.yml). Keep dependencies updated and monitor CVE databases.
  • Low · GitHub Workflow Security — .github/workflows/. Multiple GitHub Actions workflows are present but their configurations cannot be fully assessed. Potential risks include insufficient secret management, overpermissive workflow permissions, or checkout of untrusted code. Fix: Review all workflows for: least privilege permissions, secure secret handling, pinned action versions, code review requirements for PRs, and OIDC token usage where applicable.

LLM-derived; treat as a starting point, not a security audit.


Generated by RepoPilot. Verdict based on maintenance signals — see the live page for receipts. Re-run on a new commit to refresh.

Healthy signals · Devolutions/UniGetUI — RepoPilot