🎯

ln-762-dependency-audit

🎯Skill

from levnikolaevich/claude-code-skills

VibeIndex|
What it does

Performs multi-ecosystem dependency vulnerability audits, classifying security risks by CVSS severity and providing targeted fix recommendations.

πŸ“¦

Part of

levnikolaevich/claude-code-skills(85 items)

ln-762-dependency-audit

Installation

Claude CodeAdd plugin in Claude Code
/plugin add levnikolaevich/claude-code-skills
git cloneClone repository
git clone https://github.com/levnikolaevich/claude-code-skills.git ~/.claude/skills
πŸ“– Extracted from docs: levnikolaevich/claude-code-skills
12Installs
-
AddedFeb 4, 2026

Skill Details

SKILL.md

Audits project dependencies for vulnerabilities. Multi-ecosystem support (npm, .NET, Python, Go). CVSS-based severity classification.

Overview

# Dependency Audit

Audits project dependencies for known security vulnerabilities across multiple package ecosystems.

Purpose & Scope

  • Detect vulnerable dependencies using ecosystem-specific tools
  • Support multiple ecosystems: npm, NuGet, pip, Go modules, Bundler, Cargo
  • Classify vulnerabilities by severity (Critical/High/Medium/Low)
  • Provide fix recommendations with safe auto-fix guidance
  • Return normalized report to parent orchestrator (ln-760)

When to Use

  • During project bootstrap (via ln-760-security-setup)
  • CI/CD pipeline security checks
  • Pre-release security validation
  • Regular scheduled audits

---

Workflow

Phase 1: Ecosystem Detection

Step 1: Detect Package Managers

  • Check for package.json / package-lock.json (npm)
  • Check for *.csproj / packages.config (.NET)
  • Check for requirements.txt / Pipfile / pyproject.toml (Python)
  • Check for go.mod (Go)
  • Check for Gemfile (Ruby), Cargo.toml (Rust), composer.json (PHP)

Step 2: Check Tool Availability

  • For each detected ecosystem, verify audit tool is available
  • If tool missing: log warning, skip ecosystem (do not fail)

Phase 2: Audit Execution

Step 1: Run Ecosystem Audits

  • Execute audit command for each detected ecosystem
  • Prefer JSON output for parsing (see references/audit_commands.md)
  • Run audits in parallel where possible

Step 2: Parse Results

  • Normalize findings to common format: package, version, vulnerability ID, severity
  • Extract CVSS score if available

Phase 3: Report Generation

Step 1: Severity Classification

  • Map CVSS scores to severity per references/severity_mapping.md
  • Critical: CVSS 9.0-10.0
  • High: CVSS 7.0-8.9
  • Medium: CVSS 4.0-6.9
  • Low: CVSS 0.1-3.9

Step 2: Group and Sort

  • Group by ecosystem
  • Sort by severity (Critical first)
  • Include vulnerability count summary

Step 3: Build Report

  • Include package name, current version, fixed version
  • Include vulnerability ID (CVE/GHSA/OSV)
  • Do NOT include exploit details

Phase 4: Fix Recommendations

Step 1: Classify Fix Type

  • Patch update (safe auto-fix)
  • Minor update (usually safe)
  • Major update (manual review required)
  • No fix available (document and monitor)

Step 2: Generate Recommendations

  • For each vulnerability: suggest fix command
  • Flag breaking changes if major version bump
  • Note if fix requires code changes

Step 3: Return Results

  • Return structured report to orchestrator
  • Include summary: packages audited, vulnerabilities found, by severity

---

Critical Rules

  1. Never auto-fix major versions - may introduce breaking changes
  2. Verify lock file integrity - regenerate if corrupted
  3. Respect severity thresholds - per environment (see references/severity_mapping.md)
  4. Document unfixable vulns - add to known issues with review date
  5. No exploit code - report IDs only, not exploitation details

---

Definition of Done

  • [ ] All detected ecosystems audited
  • [ ] Findings classified by severity with CVSS mapping
  • [ ] Fix recommendations provided (safe vs manual)
  • [ ] Report in normalized format returned
  • [ ] Critical vulnerabilities prominently flagged
  • [ ] Lock file integrity verified

---

Reference Files

| File | Purpose |

|------|---------|

| references/audit_commands.md | Ecosystem-specific audit commands |

| references/severity_mapping.md | CVSS to severity level mapping |

| references/ci_integration_guide.md | CI/CD integration guidance |

---

Version: 2.0.0

Last Updated: 2026-01-10

More from this repository10

πŸͺ
levnikolaevich-claude-code-skillsπŸͺMarketplace

Official marketplace for Agile Linear Workflow plugin - complete end-to-end automation for software development teams using Linear. Includes 7XX Project Bootstrap series for technology-agnostic project migration.

🎯
ln-140-test-docs-creator🎯Skill

Generates comprehensive test documentation with testing strategy and test organization structure for software projects.

🎯
ln-110-project-docs-coordinator🎯Skill

Coordinates project documentation by gathering context once, detecting project type, and delegating document creation to 5 specialized workers.

🎯
ln-114-frontend-docs-creator🎯Skill

Generates design guidelines documentation for frontend projects with WCAG 2.1 compliance when a frontend framework is detected.

🎯
ln-113-backend-docs-creator🎯Skill

Generates backend documentation files (API spec and database schema) automatically when backend or database technologies are detected in a project.

🎯
ln-610-code-comments-auditor🎯Skill

Audits code comments and docstrings across 6 quality categories, generating a comprehensive compliance score and actionable recommendations for improvement.

🎯
ln-115-devops-docs-creator🎯Skill

Generates a comprehensive runbook.md for DevOps setup, dynamically tailored to project's Docker configuration and deployment specifics.

🎯
ln-772-error-handler-setup🎯Skill

Configures global exception handling middleware for .NET and Python backend applications with standardized error responses.

🎯
ln-120-reference-docs-creator🎯Skill

Generates reference documentation structure and smart documents for project tech stack, creating only justified architectural decision records and guides.

🎯
ln-625-dependencies-auditor🎯Skill

Audits dependencies for outdated packages, unused imports, unnecessary libraries, and custom implementations, providing actionable recommendations.