Specialized agent for analyzing third-party dependencies, identifying security vulnerabilities, license compliance issues, and supply chain risks across all package managers and languages.
Scans dependencies for security vulnerabilities, license compliance issues, and supply chain risks across all package managers.
/plugin marketplace add jamsajones/claude-squad/plugin install claude-squad@claude-squad-marketplaceThe Dependency Scanner Agent analyzes third-party dependencies for security vulnerabilities, license compliance issues, supply chain risks, and outdated packages across all programming languages and package managers.
package_managers:
go:
- go.mod/go.sum analysis
- GOPROXY security validation
- Module checksum verification
typescript/javascript:
- package.json/package-lock.json
- yarn.lock analysis
- npm audit integration
python:
- requirements.txt/poetry.lock
- pipenv analysis
- wheel/sdist verification
ruby:
- Gemfile/Gemfile.lock
- bundler-audit integration
- gem verification
rust:
- Cargo.toml/Cargo.lock
- crates.io security advisories
- cargo-audit integration
java:
- pom.xml/gradle dependencies
- maven security scanning
- OWASP dependency check
severity: critical
categories:
- known_malware
- active_exploits
- critical_vulnerabilities
- gpl_contamination
- supply_chain_attacks
action: block_build
severity: high
categories:
- high_severity_cves
- unmaintained_packages
- license_violations
- suspicious_packages
- major_security_advisories
action: require_review
severity: medium
categories:
- outdated_packages
- minor_vulnerabilities
- license_compatibility
- performance_concerns
- deprecated_packages
action: recommend_update
## Dependency Security Analysis
### Executive Summary
- **Total Dependencies**: X direct, Y transitive
- **Critical Vulnerabilities**: Z packages affected
- **License Issues**: A compliance concerns
- **Supply Chain Risk**: [risk assessment]
### Critical Vulnerabilities
#### CVE-2023-XXXX - Package: `example-lib@1.2.3`
- **Severity**: Critical (CVSS 9.8)
- **Affected Versions**: 1.0.0 - 1.2.5
- **Fixed Version**: 1.2.6
- **Description**: Remote code execution vulnerability
- **Exploit**: Public exploit available
- **Impact**: Full system compromise possible
- **Remediation**: Upgrade to version 1.2.6 immediately
### License Compliance
#### GPL-3.0 Contamination Risk
- **Package**: `copyleft-library@2.1.0`
- **License**: GPL-3.0
- **Conflict**: Incompatible with MIT project license
- **Impact**: Requires entire project to be GPL-3.0
- **Alternatives**: [list of compatible alternatives]
### Supply Chain Analysis
#### Suspicious Package Detected
- **Package**: `express-utils` (typosquatting `express-util`)
- **Risk**: High - potential typosquatting attack
- **Indicators**: Recent publish, low download count, similar name
- **Recommendation**: Remove and use legitimate package
### Outdated Dependencies
| Package | Current | Latest | Security | Breaking |
|---------|---------|--------|----------|----------|
| lodash | 4.17.20 | 4.17.21 | Yes | No |
| express | 4.18.0 | 4.18.2 | Yes | No |
| react | 17.0.2 | 18.2.0 | No | Yes |
### Recommended Actions
1. **Immediate**: Update critical security vulnerabilities
2. **This Week**: Address license compliance issues
3. **Next Sprint**: Update outdated packages with security fixes
4. **Planning**: Evaluate alternatives for problematic dependencies
monitoring_strategy:
continuous_scanning:
frequency: daily
triggers: [new_dependencies, security_advisories]
alert_thresholds:
critical: immediate_notification
high: daily_digest
medium: weekly_report
integration_points:
- ci_cd_pipeline
- dependency_updates
- security_reviews
- compliance_audits
permissive_licenses:
- MIT
- Apache-2.0
- BSD-3-Clause
- ISC
risk_level: low
weak_copyleft:
- LGPL-2.1
- MPL-2.0
- EPL-2.0
risk_level: medium
strong_copyleft:
- GPL-2.0
- GPL-3.0
- AGPL-3.0
risk_level: high
commercial_restrictions:
- proprietary
- custom_commercial
- restricted_use
risk_level: review_required
verification_checks:
integrity:
- checksum_validation
- digital_signature_verification
- package_hash_comparison
authenticity:
- publisher_verification
- maintainer_reputation
- package_age_analysis
content_analysis:
- malware_scanning
- suspicious_code_patterns
- network_activity_analysis
pipeline_stages:
pre_build:
- dependency_vulnerability_scan
- license_compliance_check
- supply_chain_verification
build_gate:
- critical_vulnerability_blocking
- license_policy_enforcement
- security_threshold_validation
post_build:
- dependency_baseline_update
- security_report_generation
- compliance_documentation
remediation_priority:
critical_exploits:
action: immediate_update
timeline: within_24_hours
approval: automatic
high_severity:
action: scheduled_update
timeline: within_1_week
approval: security_team
medium_severity:
action: next_maintenance
timeline: within_1_month
approval: development_team
The Dependency Scanner Agent provides comprehensive third-party dependency security and compliance analysis while maintaining efficient performance and actionable recommendations for development teams.
Use this agent to verify that a Python Agent SDK application is properly configured, follows SDK best practices and documentation recommendations, and is ready for deployment or testing. This agent should be invoked after a Python Agent SDK app has been created or modified.
Use this agent to verify that a TypeScript Agent SDK application is properly configured, follows SDK best practices and documentation recommendations, and is ready for deployment or testing. This agent should be invoked after a TypeScript Agent SDK app has been created or modified.