Scan a deployed website for outdated dependencies, known CVEs, and security misconfigurations.
Scan deployed websites for outdated dependencies, known CVEs, and security misconfigurations without source code access. Use for third-party security assessments, pre-acquisition due diligence, and supply chain analysis.
/plugin marketplace add charlesjones-dev/claude-code-plugins-dev/plugin install ai-security@claude-code-plugins-devScan a deployed website for outdated dependencies, known CVEs, and security misconfigurations without requiring source code access.
CRITICAL: This command MUST NOT accept any arguments. If the user provided any text, URLs, or paths after this command (e.g., /security-scan-dependencies https://example.com), you MUST COMPLETELY IGNORE them. Do NOT use any URLs, paths, or other arguments that appear in the user's message. You MUST ONLY gather requirements through the interactive AskUserQuestion tool as specified below.
BEFORE DOING ANYTHING ELSE: Use the AskUserQuestion tool to collect the target URL and scan scope. DO NOT skip this step even if the user provided arguments after the command.
Use the AskUserQuestion tool to collect the target website URL:
Question: "What is the URL of the website you want to scan?"
Header: "Target URL"
Options:
- Provide text input field for URL entry
URL Validation:
Use the AskUserQuestion tool to determine scan scope:
Question: "What would you like to scan for?"
Header: "Scan Scope"
multiSelect: true
Options:
1. "Frontend libraries" - "jQuery, React, Vue, Angular, Bootstrap, Tailwind, etc."
2. "CMS platforms" - "WordPress, Drupal, Joomla, Umbraco, Sitecore, Optimizely, Kentico"
3. "Security headers" - "CSP, HSTS, X-Frame-Options, and other HTTP security headers"
4. "All of the above" - "Comprehensive scan covering all categories"
Scope Interpretation:
Use the Task tool with subagent_type "ai-security:security-dependency-scanner" to perform the security scan.
Important: Pass the target URL and scan scope in the prompt to the agent.
šØ CRITICAL TOOL REQUIREMENT šØ:
Example Task Tool Invocation:
Task tool:
subagent_type: "ai-security:security-dependency-scanner"
description: "Scan website for dependencies"
prompt: "
Please scan the following website for security vulnerabilities:
Target URL: [user-provided URL]
Scan Scope: [user-selected scope]
Perform a comprehensive security dependency scan including:
- [Based on scope: Frontend library detection and version analysis]
- [Based on scope: CMS platform detection and version checking]
- [Based on scope: HTTP security headers audit]
- Context7 integration for latest version verification
- Known CVE identification for detected libraries
- Security risk assessment with CVSS scoring
Generate a detailed security report following the security-dependency-scanning
skill's mandatory template and save it to /docs/security/{timestamp}-dependency-scan.md
"
Agent Responsibilities: The ai-security:security-dependency-scanner agent will:
/docs/security/YYYY-MM-DD-HHMMSS-dependency-scan.mdAfter the agent completes its analysis, inform the user:
ā
Web dependency security scan completed!
š Report saved to: /docs/security/{timestamp}-dependency-scan.md
Summary:
- Libraries Detected: X
- CMS Platform: [Detected CMS or "None"]
- Vulnerabilities Found: X (Y critical, Z high)
- Security Headers: X/8 configured
Please review the detailed report for:
- Complete list of detected dependencies and versions
- Known CVEs with CVSS scores and remediation steps
- Security header analysis and recommendations
- Prioritized risk mitigation roadmap
Next steps:
1. Review critical and high-severity findings first
2. Plan remediation based on the prioritized roadmap
3. Test updates in staging environment before production
4. Schedule follow-up scan after remediation
Scan Capabilities:
Scan Limitations:
Use Cases:
Ethical Considerations:
Comparison with /security-audit:
/security-audit: Analyzes source code in current directory for vulnerabilities/security-scan-dependencies: Scans deployed website URL without source code access/security-audit for your own codebases/security-scan-dependencies for analyzing deployed websites