home / skills / jwynia / agent-skills / dependency-scan
This skill analyzes project dependencies to detect known CVEs and security issues across npm, pip, and multiple ecosystems.
npx playbooks add skill jwynia/agent-skills --skill dependency-scanReview the files below or copy the command above to add this skill to your agents.
---
name: dependency-scan
description: Detect CVEs and security issues in project dependencies. Use when you need to analyze packages for known vulnerabilities across npm, pip, cargo, and other ecosystems.
license: MIT
metadata:
author: jwynia
version: "1.0"
type: utility
mode: evaluative
domain: development
---
# Dependency Scan
Analyze package dependencies for known vulnerabilities.
## Quick Start
```
/dependency-scan # Scan all detected package managers
/dependency-scan --npm # Node.js packages only
/dependency-scan --pip # Python packages only
/dependency-scan --fix # Auto-fix where possible
```
## What This Skill Does
1. **Identifies package managers** in your project
2. **Parses dependency manifests** (package.json, requirements.txt, etc.)
3. **Checks vulnerability databases** for known CVEs
4. **Reports severity and remediation** options
5. **Optionally auto-fixes** by updating to patched versions
## Supported Package Managers
| Ecosystem | Files | Tool Used |
|-----------|-------|-----------|
| Node.js | package.json, package-lock.json | npm audit |
| Python | requirements.txt, Pipfile, pyproject.toml | pip-audit, safety |
| Ruby | Gemfile, Gemfile.lock | bundler-audit |
| Java | pom.xml, build.gradle | dependency-check |
| Go | go.mod, go.sum | govulncheck |
| Rust | Cargo.toml, Cargo.lock | cargo-audit |
| PHP | composer.json, composer.lock | composer audit |
| .NET | *.csproj, packages.config | dotnet list --vulnerable |
## Scan Modes
### Full Scan
```
/dependency-scan
```
Scans all detected package managers, reports all severity levels.
### Specific Ecosystem
```
/dependency-scan --npm
/dependency-scan --pip
/dependency-scan --go
```
### Severity Filter
```
/dependency-scan --severity critical,high
/dependency-scan --severity medium
```
### Auto-Fix Mode
```
/dependency-scan --fix
/dependency-scan --fix --dry-run # Preview changes
```
Attempts to update vulnerable packages to patched versions.
## Output Format
### Summary View
```
DEPENDENCY SCAN RESULTS
=======================
Scanned: package.json, requirements.txt
Packages analyzed: 127 (78 npm, 49 pip)
VULNERABILITIES BY SEVERITY
Critical: 2
High: 4
Medium: 8
Low: 12
TOP ISSUES
[!] CRITICAL: lodash < 4.17.21
CVE-2021-23337: Command Injection
Affected: [email protected]
Fix: npm update lodash
[!] CRITICAL: urllib3 < 2.0.6
CVE-2023-43804: Cookie Leak
Affected: [email protected]
Fix: pip install urllib3>=2.0.6
[H] HIGH: express < 4.19.2
CVE-2024-29041: Open Redirect
Affected: [email protected]
Fix: npm update express
```
### Detailed View
```
/dependency-scan --details
```
```
DETAILED VULNERABILITY REPORT
=============================
CVE-2021-23337
--------------
Package: lodash
Installed: 4.17.19
Patched: 4.17.21
Severity: CRITICAL (CVSS 9.8)
Description:
Command Injection in lodash template function allows
arbitrary command execution via crafted template strings.
Attack Vector: Remote, no auth required
Exploitability: Public exploit available
References:
- https://nvd.nist.gov/vuln/detail/CVE-2021-23337
- https://github.com/lodash/lodash/issues/5085
Remediation:
npm update lodash
# or
npm install [email protected]
```
## Vulnerability Sources
### Databases Consulted
| Database | Coverage |
|----------|----------|
| NVD (National Vulnerability Database) | All CVEs |
| GitHub Advisory Database | GitHub-reported |
| OSV (Open Source Vulnerabilities) | Multi-ecosystem |
| npm Security Advisories | Node.js specific |
| PyPI Advisory Database | Python specific |
| RustSec Advisory Database | Rust specific |
### CVSS Scoring
| Score | Severity |
|-------|----------|
| 9.0-10.0 | Critical |
| 7.0-8.9 | High |
| 4.0-6.9 | Medium |
| 0.1-3.9 | Low |
## Commands Used
### Node.js (npm)
```bash
npm audit --json
npm audit fix # Auto-fix
npm audit fix --force # Breaking changes OK
```
### Python (pip-audit)
```bash
pip-audit
pip-audit --fix
pip-audit -r requirements.txt
```
### Python (safety)
```bash
safety check
safety check -r requirements.txt
```
### Ruby (bundler-audit)
```bash
bundle-audit check
bundle-audit update # Update advisory DB
```
### Go (govulncheck)
```bash
govulncheck ./...
```
### Rust (cargo-audit)
```bash
cargo audit
cargo audit fix # Auto-fix
```
## Auto-Fix Behavior
### Safe Fixes
Updates within semver-compatible range:
- Patch versions (1.2.3 → 1.2.4)
- Minor versions if locked to major (^1.2.3 → ^1.3.0)
### Breaking Fixes
May introduce breaking changes:
- Major version updates
- Requires `--force` flag
### Fix Report
```
AUTO-FIX REPORT
===============
Fixed: 8 vulnerabilities
lodash: 4.17.19 → 4.17.21
axios: 0.21.0 → 0.21.1
minimist: 1.2.5 → 1.2.6
Unable to fix: 2 vulnerabilities
react-scripts: No patch available (major version required)
webpack-dev-server: Conflicts with other dependencies
Review package.json changes before committing.
```
## Configuration
### Ignore Known Issues
Create `.dependency-scan-ignore`:
```yaml
# Ignore specific CVEs (document reason!)
ignore:
- id: CVE-2021-23337
reason: "Not exploitable in our usage, lodash template not used"
expires: 2024-12-31
- id: GHSA-xxx-xxx
reason: "Development dependency only"
# Ignore packages
packages:
- name: lodash
versions: ["< 4.17.0"] # Only old versions
```
### Severity Thresholds
```yaml
# .dependency-scan.yaml
thresholds:
fail_on: critical # Fail CI on critical
warn_on: high # Warn on high
ignore_below: low # Don't report low
fix:
auto_fix: true
allow_major: false # No major version bumps
```
## CI/CD Integration
### GitHub Actions
```yaml
- name: Dependency Scan
run: |
/dependency-scan --severity critical,high --fail-on-findings
- name: Auto-fix and PR
if: failure()
run: |
/dependency-scan --fix
git add .
gh pr create --title "Security: Update vulnerable dependencies"
```
### Pre-Commit
```bash
#!/bin/sh
# Run on package.json changes
if git diff --cached --name-only | grep -q "package.json\|requirements.txt"; then
/dependency-scan --severity critical,high
fi
```
## Dependency Health
### Beyond CVEs
```
/dependency-scan --health
```
Additional checks:
- **Outdated packages**: Major versions behind
- **Deprecated packages**: No longer maintained
- **License issues**: Incompatible licenses
- **Maintenance**: Last update, open issues
### Health Report
```
DEPENDENCY HEALTH
=================
Outdated (major behind): 5
react: 17.0.2 → 18.2.0
typescript: 4.9.5 → 5.3.3
Deprecated: 1
request: Use got, axios, or node-fetch
Unmaintained (>2 years): 2
moment: Consider dayjs or date-fns
License Issues: 0
```
## Related Skills
- `/security-scan` - Full security analysis
- `/secrets-scan` - Credential detection
- `/config-scan` - Configuration security
This skill scans project dependency manifests and package trees to detect known CVEs, security issues, and dependency health problems across ecosystems such as npm, pip, cargo, and more. It reports severity, affected versions, remediation steps, and can optionally attempt safe auto-fixes or produce a dry-run. Use it to enforce dependency security in local checks, CI pipelines, and pre-commit hooks.
The scanner identifies package managers by detecting manifest files (package.json, requirements.txt, Cargo.toml, etc.), parses dependency graphs, and queries multiple vulnerability databases (NVD, OSV, GitHub Advisory, ecosystem-specific advisories). It aggregates results by severity, maps CVEs to installed versions, suggests patched versions or commands to remediate, and can perform controlled updates when --fix is enabled. Detailed and summary views are available, plus health checks for outdated, deprecated, or unmaintained packages.
Which package managers are supported?
Major ecosystems are supported including npm, pip, cargo (Rust), Go, Ruby, Java, PHP, and .NET via their common manifest files and corresponding auditing tools.
Can the tool automatically fix all vulnerabilities?
No. It will auto-fix semver-compatible patch/minor updates safely. Major version upgrades or conflicts require manual review and may be marked Unable to fix.
Which vulnerability databases are consulted?
The scanner consults NVD, OSV, GitHub Advisory Database, and ecosystem-specific advisories (npm, PyPI, RustSec, etc.) to provide broad coverage.