ln-762-dependency-audit
from levnikolaevich/claude-code-skills
Greate Claude Code skills collection. Production-ready skills that cover the full delivery workflow — from research and discovery to epic planning, task breakdown, implementation, testing, code review, and quality gates.
65 stars13 forksUpdated Jan 25, 2026
npx skills add https://github.com/levnikolaevich/claude-code-skills --skill ln-762-dependency-auditSKILL.md
Dependency Audit
Audits project dependencies for known security vulnerabilities across multiple package ecosystems.
Purpose & Scope
- Detect vulnerable dependencies using ecosystem-specific tools
- Support multiple ecosystems: npm, NuGet, pip, Go modules, Bundler, Cargo
- Classify vulnerabilities by severity (Critical/High/Medium/Low)
- Provide fix recommendations with safe auto-fix guidance
- Return normalized report to parent orchestrator (ln-760)
When to Use
- During project bootstrap (via ln-760-security-setup)
- CI/CD pipeline security checks
- Pre-release security validation
- Regular scheduled audits
Workflow
Phase 1: Ecosystem Detection
Step 1: Detect Package Managers
- Check for
package.json/package-lock.json(npm) - Check for
*.csproj/packages.config(.NET) - Check for
requirements.txt/Pipfile/pyproject.toml(Python) - Check for
go.mod(Go) - Check for
Gemfile(Ruby),Cargo.toml(Rust),composer.json(PHP)
Step 2: Check Tool Availability
- For each detected ecosystem, verify audit tool is available
- If tool missing: log warning, skip ecosystem (do not fail)
Phase 2: Audit Execution
Step 1: Run Ecosystem Audits
- Execute audit command for each detected ecosystem
- Prefer JSON output for parsing (see
references/audit_commands.md) - Run audits in parallel where possible
Step 2: Parse Results
- Normalize findings to common format: package, version, vulnerability ID, severity
- Extract CVSS score if available
Phase 3: Report Generation
Step 1: Severity Classification
- Map CVSS scores to severity per
references/severity_mapping.md - Critical: CVSS 9.0-10.0
- High: CVSS 7.0-8.9
- Medium: CVSS 4.0-6.9
- Low: CVSS 0.1-3.9
Step 2: Group and Sort
- Group by ecosystem
- Sort by severity (Critical first)
- Include vulnerability count summary
Step 3: Build Report
- Include package name, current version, fixed version
- Include vulnerability ID (CVE/GHSA/OSV)
- Do NOT include exploit details
Phase 4: Fix Recommendations
Step 1: Classify Fix Type
- Patch update (safe auto-fix)
- Minor update (usually safe)
- Major update (manual review required)
- No fix available (document and monitor)
Step 2: Generate Recommendations
- For each vulnerability: suggest fix command
- Flag breaking changes if major version bump
- Note if fix requires code changes
Step 3: Return Results
- Return structured report to orchestrator
- Include summary: packages audited, vulnerabilities found, by severity
Critical Rules
- Never auto-fix major versions - may introduce breaking changes
- Verify lock file integrity - regenerate if corrupted
- Respect severity thresholds - per environment (see
references/severity_mapping.md) - Document unfixable vulns - add to known issues with review date
- No exploit code - report IDs only, not exploitation details
Definition of Done
- All detected ecosystems audited
- Findings classified by severity with CVSS mapping
- Fix recommendations provided (safe vs manual)
- Report in normalized format returned
- Critical vulnerabilities prominently flagged
- Lock file integrity verified
Reference Files
| File | Purpose |
|---|---|
references/audit_commands.md | Ecosystem-specific audit commands |
references/severity_mapping.md | CVSS to severity level mapping |
references/ci_integration_guide.md | CI/CD integration guidance |
Version: 2.0.0 Last Updated: 2026-01-10
Repository Stats
Stars65
Forks13
LicenseMIT License