dependency-audit
Analyzes project dependencies for staleness, known vulnerabilities, license compatibility, and unused packages. Produces an actionable audit report with prioritized update recommendations. No external services required — uses local tooling and registry APIs.
Best use case
dependency-audit is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
Analyzes project dependencies for staleness, known vulnerabilities, license compatibility, and unused packages. Produces an actionable audit report with prioritized update recommendations. No external services required — uses local tooling and registry APIs.
Teams using dependency-audit should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/dependency-audit/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How dependency-audit Compares
| Feature / Agent | dependency-audit | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
Analyzes project dependencies for staleness, known vulnerabilities, license compatibility, and unused packages. Produces an actionable audit report with prioritized update recommendations. No external services required — uses local tooling and registry APIs.
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# Skill: Dependency Audit ## What This Skill Does Produces a **dependency health report** covering four dimensions: staleness (outdated versions), security (known vulnerabilities), licensing (compatibility issues), and usage (potentially unused packages). ## When to Use - Periodic maintenance check (monthly/quarterly) - Before a major release - When security is a concern - When the user says "audit our dependencies" or "what needs updating?" ## Execution Model - **Always**: the primary agent runs this skill directly. - **Token budget**: ~3-5k tokens. - **Output**: chat-based audit report. Optionally written to `docs/dependency-audit.md`. ## Workflow ### Step 1: Identify Package Manager ```bash # Node.js [ -f "package-lock.json" ] && echo "npm" [ -f "yarn.lock" ] && echo "yarn" [ -f "pnpm-lock.yaml" ] && echo "pnpm" # Python [ -f "requirements.txt" ] && echo "pip" [ -f "pyproject.toml" ] && echo "poetry/uv" # Go [ -f "go.sum" ] && echo "go modules" ``` ### Step 2: Check Staleness ```bash # Node.js npm outdated --json 2>/dev/null # Python pip list --outdated --format=json 2>/dev/null # Go go list -u -m all 2>/dev/null ``` Categorize updates: | Type | Risk | Action | |------|------|--------| | Patch (1.0.0 → 1.0.1) | Low | Safe to update | | Minor (1.0.0 → 1.1.0) | Medium | Review changelog | | Major (1.0.0 → 2.0.0) | High | Breaking changes likely | ### Step 3: Check Vulnerabilities ```bash # Node.js npm audit --json 2>/dev/null # Python pip-audit --format=json 2>/dev/null # Go govulncheck ./... 2>/dev/null ``` ### Step 4: Check Licenses ```bash # Node.js npx -y license-checker --json 2>/dev/null | head -100 # Python pip-licenses --format=json 2>/dev/null ``` Flag problematic licenses: | License | Compatibility | |---------|--------------| | MIT, Apache-2.0, BSD | Permissive | | GPL-3.0 | Copyleft (check project license) | | AGPL-3.0 | Strong copyleft | | Unknown | Investigate | ### Step 5: Generate Report ```markdown ## Dependency Audit ### Summary | Metric | Value | |--------|-------| | Total dependencies | N | | Outdated | N | | Vulnerabilities | N | | License issues | N | ### Vulnerabilities (fix immediately) | Package | Severity | Advisory | Fix | |---------|----------|----------|-----| ### Major Updates Available | Package | Current | Latest | Breaking Changes | |---------|---------|--------|-----------------| ### Minor/Patch Updates | Package | Current | Latest | Type | |---------|---------|--------|------| ### License Concerns | Package | License | Issue | |---------|---------|-------| ### Recommendations 1. <prioritized action> ``` ## Rules 1. **Use local tools**: prefer `npm audit`, `pip-audit`, `govulncheck` over external services. 2. **Prioritize security**: vulnerabilities are more urgent than staleness. 3. **Don't auto-update**: this skill reports findings. Actual updates should be planned and tested. 4. **License context matters**: a GPL dependency in a MIT project might be fine (if not distributed) or a problem. Note the nuance. 5. **No built-in explore agent**: do NOT use the built-in `explore` subagent type.
Related Skills
zeroize-audit
Detects missing zeroization of sensitive data in source code and identifies zeroization removed by compiler optimizations, with assembly-level analysis, and control-flow verification. Use for auditing C/C++/Rust code handling secrets, keys, passwords, or other sensitive data.
vibe-code-auditor
Audit rapidly generated or AI-produced code for structural flaws, fragility, and production risks.
infrastructure-audit
Comprehensive infrastructure security audit framework for IaC, Docker, Kubernetes, and cloud configurations. Use for full infrastructure audits.
dependency-management-deps-audit
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues,...
codebase-cleanup-deps-audit
You are a dependency security expert specializing in vulnerability scanning, license compliance, and supply chain security. Analyze project dependencies for known vulnerabilities, licensing issues,...
bigquery-pipeline-audit
Audits Python + BigQuery pipelines for cost safety, idempotency, and production readiness. Returns a structured report with exact patch locations.
audit-prep-assistant
Prepares codebases for security review using Trail of Bits' checklist. Helps set review goals, runs static analysis tools, increases test coverage, removes dead code, ensures accessibility, and generates documentation (flowcharts, user stories, inline comments).
accessibility-compliance-accessibility-audit
You are an accessibility expert specializing in WCAG compliance, inclusive design, and assistive technology compatibility. Conduct audits, identify barriers, and provide remediation guidance.
seo-content-auditor
Analyzes provided content for quality, E-E-A-T signals, and SEO best practices. Scores content and provides improvement recommendations based on established guidelines.
seo-audit
Diagnose and audit SEO issues affecting crawlability, indexation, rankings, and organic performance.
production-code-audit
Autonomously deep-scan entire codebase line-by-line, understand architecture and patterns, then systematically transform it to production-grade, corporate-level professional quality with optimizations
local-legal-seo-audit
Audit and improve local SEO for law firms, attorneys, forensic experts and legal/professional services sites with local presence, focusing on GBP, directories, E-E-A-T and practice/location pages.