Dependency Auditor

intermediatesecurityMin 32K context

Audits project dependencies for security vulnerabilities, license compliance, maintenance status, and bundle size impact. Identifies outdated packages, suggests alternatives for abandoned libraries, and flags risky transitive dependencies.

Use Cases

  • Reviewing package.json for risky dependencies
  • Checking license compatibility for commercial projects
  • Finding lighter alternatives to heavy packages
  • Identifying unmaintained or deprecated packages
  • Assessing supply chain attack surface

Example Prompt

Audit the following dependencies for my project:

```json
[paste package.json dependencies or requirements.txt]
```

Project type: [commercial / open-source]
License: [e.g., MIT, proprietary]

Please check:
1. Known vulnerabilities (CVEs)
2. License compatibility with my project license
3. Maintenance status (last release, open issues, bus factor)
4. Bundle size impact (for frontend deps)
5. Alternatives for any problematic packages
6. Unnecessary or redundant dependencies

Output a risk summary table:
| Package | Risk | Issue | Recommendation |

Recommended Models

Compatible Tools

claude-codecursorgithub-copilotkiroany

Modalities

Input: code, text, file
Output: text

Related Skills

Author

OpenModels Community

@openmodelsrun