vulnerability-scanner

Security vulnerability scanning for dependencies and code, with CVE database checking and risk assessment

509 stars

Best use case

vulnerability-scanner is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

Security vulnerability scanning for dependencies and code, with CVE database checking and risk assessment

Teams using vulnerability-scanner should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/vulnerability-scanner/SKILL.md --create-dirs "https://raw.githubusercontent.com/a5c-ai/babysitter/main/library/specializations/code-migration-modernization/skills/vulnerability-scanner/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/vulnerability-scanner/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How vulnerability-scanner Compares

Feature / Agentvulnerability-scannerStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

Security vulnerability scanning for dependencies and code, with CVE database checking and risk assessment

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# Vulnerability Scanner Skill

Performs comprehensive security vulnerability scanning for dependencies and code, integrating with CVE databases and security platforms to identify, assess, and prioritize security risks for migration planning.

## Purpose

Enable comprehensive security vulnerability detection for:
- CVE database checking for known vulnerabilities
- Severity assessment and prioritization
- Exploitability analysis
- Patch availability checking
- Transitive vulnerability chain mapping
- Risk scoring and remediation guidance

## Capabilities

### 1. CVE Database Checking
- Query NVD (National Vulnerability Database)
- Check GitHub Advisory Database
- Query vendor-specific advisory databases
- Cross-reference multiple CVE sources
- Track CVE publication dates and updates

### 2. Severity Assessment
- CVSS (Common Vulnerability Scoring System) scoring
- Severity categorization (Critical, High, Medium, Low)
- Environmental score adjustments
- Temporal score analysis
- Impact assessment

### 3. Exploitability Analysis
- Check for known exploits in the wild
- Assess attack vector complexity
- Evaluate privileges required
- Analyze user interaction requirements
- Track exploit maturity level

### 4. Patch Availability Checking
- Identify available patches and fixes
- Check for security advisories
- Find upgrade paths to secure versions
- Track vendor patch timelines
- Monitor backport availability

### 5. Transitive Vulnerability Chain Mapping
- Map vulnerability paths through dependency trees
- Identify all affected dependency chains
- Calculate exposure scope
- Prioritize based on path depth
- Recommend targeted remediations

### 6. Risk Scoring
- Calculate composite risk scores
- Factor in business context
- Assess exposure likelihood
- Evaluate potential impact
- Generate prioritized remediation lists

## Tool Integrations

This skill can leverage the following external tools when available:

| Tool | Purpose | Integration Method |
|------|---------|-------------------|
| Snyk | Comprehensive vulnerability scanning | CLI / API |
| npm audit | Node.js vulnerability scanning | CLI |
| OWASP Dependency-Check | Cross-platform scanning | CLI |
| Trivy | Container and filesystem scanning | MCP Server / CLI |
| Grype | Vulnerability scanner | CLI |
| GitHub Dependabot | Advisory checking | API |
| OSV Scanner | Google's vulnerability scanner | CLI |
| Semgrep | SAST with security rules | CLI |
| MCP-Scan | MCP server security | Tool |

## Usage

### Basic Scanning

```bash
# Invoke skill for vulnerability scanning
# The skill will scan dependencies and optionally code

# Expected inputs:
# - targetPath: Path to project root
# - scanScope: 'dependencies' | 'code' | 'full'
# - severityThreshold: 'critical' | 'high' | 'medium' | 'low'
# - outputFormat: 'json' | 'sarif' | 'markdown'
```

### Scanning Workflow

1. **Discovery Phase**
   - Identify package managers and dependency files
   - Detect codebase languages
   - Check for existing security configurations

2. **Dependency Scanning**
   - Extract dependency information
   - Query vulnerability databases
   - Map vulnerabilities to dependencies

3. **Code Scanning (Optional)**
   - Run SAST analysis
   - Check for security anti-patterns
   - Identify hardcoded secrets

4. **Analysis Phase**
   - Calculate severity scores
   - Assess exploitability
   - Check patch availability
   - Map transitive chains

5. **Report Generation**
   - Generate prioritized vulnerability list
   - Provide remediation guidance
   - Create compliance reports

## Output Schema

```json
{
  "scanId": "string",
  "timestamp": "ISO8601",
  "target": {
    "path": "string",
    "packageManagers": ["string"],
    "languages": ["string"]
  },
  "summary": {
    "totalVulnerabilities": "number",
    "critical": "number",
    "high": "number",
    "medium": "number",
    "low": "number",
    "fixable": "number",
    "riskScore": "number (0-100)"
  },
  "vulnerabilities": [
    {
      "id": "string (CVE-XXXX-XXXXX)",
      "title": "string",
      "description": "string",
      "severity": "critical|high|medium|low",
      "cvss": {
        "score": "number",
        "vector": "string",
        "version": "string"
      },
      "package": {
        "name": "string",
        "version": "string",
        "ecosystem": "string"
      },
      "affectedVersions": "string",
      "fixedVersions": "string",
      "patchAvailable": "boolean",
      "exploitability": {
        "hasKnownExploit": "boolean",
        "exploitMaturity": "string",
        "attackVector": "string"
      },
      "dependencyPath": ["string"],
      "references": ["string"],
      "remediation": {
        "recommendation": "string",
        "upgradeTarget": "string",
        "alternativePackages": ["string"]
      }
    }
  ],
  "securityIssues": [
    {
      "type": "string",
      "severity": "string",
      "file": "string",
      "line": "number",
      "description": "string",
      "cwe": "string",
      "recommendation": "string"
    }
  ],
  "compliance": {
    "passesPolicy": "boolean",
    "violations": ["string"],
    "waivers": ["string"]
  }
}
```

## Integration with Migration Processes

This skill integrates with the following Code Migration/Modernization processes:

- **dependency-analysis-updates**: Security assessment of dependencies
- **security-remediation-migration**: Primary tool for security fixes
- **cloud-migration**: Security compliance for cloud deployment
- **legacy-codebase-assessment**: Security posture evaluation

## Configuration

### Skill Configuration File

Create `.vulnerability-scanner.json` in the project root:

```json
{
  "scanScope": "full",
  "severityThreshold": "medium",
  "failOnSeverity": "critical",
  "databases": ["nvd", "ghsa", "osv"],
  "excludeVulnerabilities": [],
  "waivers": [
    {
      "id": "CVE-2021-12345",
      "reason": "Not exploitable in our context",
      "expiresAt": "2026-06-01"
    }
  ],
  "policy": {
    "maxCritical": 0,
    "maxHigh": 5,
    "requirePatchWithin": {
      "critical": "7d",
      "high": "30d",
      "medium": "90d"
    }
  },
  "reporting": {
    "formats": ["json", "sarif", "markdown"],
    "outputDir": "./security-report"
  }
}
```

## MCP Server Integration

When MCP-Scan is available:

```javascript
// Example MCP security scan
{
  "tool": "mcp_scan_security",
  "arguments": {
    "target": "./",
    "checks": ["toolPoisoning", "piiDetection", "promptInjection"]
  }
}
```

When Trivy is available:

```javascript
// Example Trivy vulnerability scan
{
  "tool": "trivy_scan",
  "arguments": {
    "target": "./",
    "scanners": ["vuln", "secret"],
    "severity": "CRITICAL,HIGH"
  }
}
```

## Vulnerability Databases

### Supported Databases

| Database | Coverage | Update Frequency |
|----------|----------|------------------|
| NVD | All CVEs | Hourly |
| GitHub Advisory | Open source packages | Real-time |
| OSV | Multi-ecosystem | Real-time |
| Snyk DB | Proprietary enrichment | Real-time |
| npm Advisory | Node.js packages | Real-time |
| RustSec | Rust packages | Real-time |

### Database Priority

1. GitHub Advisory Database (most accurate for open source)
2. NVD (comprehensive, standardized)
3. OSV (aggregated, multi-ecosystem)
4. Vendor-specific (ecosystem-specific details)

## Severity Classification

### CVSS v3.x Mapping

| CVSS Score | Severity | Action Required |
|------------|----------|-----------------|
| 9.0 - 10.0 | Critical | Immediate remediation |
| 7.0 - 8.9 | High | Priority remediation |
| 4.0 - 6.9 | Medium | Scheduled remediation |
| 0.1 - 3.9 | Low | Monitor and plan |

### Risk Prioritization Factors

1. **Severity Score**: Base CVSS score
2. **Exploitability**: Known exploits in the wild
3. **Exposure**: Internet-facing vs internal
4. **Dependency Depth**: Direct vs transitive
5. **Fix Availability**: Patch/upgrade available

## Best Practices

1. **Regular Scanning**: Integrate into CI/CD pipelines
2. **Policy Enforcement**: Define and enforce security policies
3. **Waiver Management**: Document and review waivers regularly
4. **Prioritization**: Focus on critical and exploitable vulnerabilities
5. **Monitoring**: Set up alerts for new vulnerabilities
6. **Remediation Tracking**: Track remediation progress over time

## Related Skills

- `dependency-scanner`: Dependency inventory and SBOM generation
- `static-code-analyzer`: Code-level security analysis
- `compliance-validator`: Compliance checking

## Related Agents

- `security-vulnerability-assessor`: Uses this skill for security assessment
- `dependency-modernization-agent`: Uses this skill for security updates
- `migration-readiness-assessor`: Uses this skill for security evaluation

## References

- [MCP-Scan](https://github.com/invariantlabs-ai/mcp-scan)
- [Trivy](https://aquasecurity.github.io/trivy/)
- [Snyk](https://snyk.io/)
- [OWASP Dependency-Check](https://owasp.org/www-project-dependency-check/)
- [OSV Scanner](https://google.github.io/osv-scanner/)
- [NVD](https://nvd.nist.gov/)
- [GitHub Advisory Database](https://github.com/advisories)

Related Skills

security-scanner

509
from a5c-ai/babysitter

Run security scans including SAST, dependency scanning, and secret detection

secret-detection-scanner

509
from a5c-ai/babysitter

Detect secrets, credentials, and sensitive data in code and configurations. Scan git history for secrets, detect API keys, tokens, passwords, check environment files, monitor CI/CD logs for exposure, generate remediation steps, and track secret rotation status.

owasp-security-scanner

509
from a5c-ai/babysitter

Automated OWASP Top 10 vulnerability detection and assessment. Run OWASP ZAP automated scans, detect injection vulnerabilities, identify broken authentication patterns, check for sensitive data exposure, analyze security misconfigurations, and generate OWASP-compliant reports.

iac-security-scanner

509
from a5c-ai/babysitter

Infrastructure as Code security scanning and policy enforcement for Terraform, CloudFormation, Kubernetes, and Pulumi

git-forensics-scanner

509
from a5c-ai/babysitter

Git diff forensics for surfacing and classifying code changes for trojan detection

gcp-security-scanner

509
from a5c-ai/babysitter

GCP security configuration scanning and hardening using Security Command Center, Forseti, and ScoutSuite

dast-scanner

509
from a5c-ai/babysitter

Dynamic Application Security Testing execution and management. Configure and execute OWASP ZAP and Nuclei scans, run authenticated scanning, manage scan policies and scope, correlate findings with SAST results, and generate comprehensive vulnerability reports.

container-security-scanner

509
from a5c-ai/babysitter

Container image and Kubernetes security scanning for CVEs, misconfigurations, and compliance

azure-security-scanner

509
from a5c-ai/babysitter

Azure security configuration scanning and hardening using Azure Security Center, Azure Policy, and ScoutSuite

aws-security-scanner

509
from a5c-ai/babysitter

AWS security configuration scanning and hardening using Prowler, Security Hub, and AWS Config

tech-stack-scanner

509
from a5c-ai/babysitter

Automated technical architecture review, security assessment, scalability analysis

dependency-scanner

509
from a5c-ai/babysitter

Comprehensive dependency scanning, inventory generation, and SBOM creation for migration readiness assessment