Security vulnerability scanning for dependencies and code, with CVE database checking and risk assessment
Scans dependencies and code for security vulnerabilities using CVE databases and risk assessment.
npx claudepluginhub a5c-ai/babysitterThis skill is limited to using the following tools:
README.mdPerforms comprehensive security vulnerability scanning for dependencies and code, integrating with CVE databases and security platforms to identify, assess, and prioritize security risks for migration planning.
Enable comprehensive security vulnerability detection for:
This skill can leverage the following external tools when available:
| Tool | Purpose | Integration Method |
|---|---|---|
| Snyk | Comprehensive vulnerability scanning | CLI / API |
| npm audit | Node.js vulnerability scanning | CLI |
| OWASP Dependency-Check | Cross-platform scanning | CLI |
| Trivy | Container and filesystem scanning | MCP Server / CLI |
| Grype | Vulnerability scanner | CLI |
| GitHub Dependabot | Advisory checking | API |
| OSV Scanner | Google's vulnerability scanner | CLI |
| Semgrep | SAST with security rules | CLI |
| MCP-Scan | MCP server security | Tool |
# Invoke skill for vulnerability scanning
# The skill will scan dependencies and optionally code
# Expected inputs:
# - targetPath: Path to project root
# - scanScope: 'dependencies' | 'code' | 'full'
# - severityThreshold: 'critical' | 'high' | 'medium' | 'low'
# - outputFormat: 'json' | 'sarif' | 'markdown'
Discovery Phase
Dependency Scanning
Code Scanning (Optional)
Analysis Phase
Report Generation
{
"scanId": "string",
"timestamp": "ISO8601",
"target": {
"path": "string",
"packageManagers": ["string"],
"languages": ["string"]
},
"summary": {
"totalVulnerabilities": "number",
"critical": "number",
"high": "number",
"medium": "number",
"low": "number",
"fixable": "number",
"riskScore": "number (0-100)"
},
"vulnerabilities": [
{
"id": "string (CVE-XXXX-XXXXX)",
"title": "string",
"description": "string",
"severity": "critical|high|medium|low",
"cvss": {
"score": "number",
"vector": "string",
"version": "string"
},
"package": {
"name": "string",
"version": "string",
"ecosystem": "string"
},
"affectedVersions": "string",
"fixedVersions": "string",
"patchAvailable": "boolean",
"exploitability": {
"hasKnownExploit": "boolean",
"exploitMaturity": "string",
"attackVector": "string"
},
"dependencyPath": ["string"],
"references": ["string"],
"remediation": {
"recommendation": "string",
"upgradeTarget": "string",
"alternativePackages": ["string"]
}
}
],
"securityIssues": [
{
"type": "string",
"severity": "string",
"file": "string",
"line": "number",
"description": "string",
"cwe": "string",
"recommendation": "string"
}
],
"compliance": {
"passesPolicy": "boolean",
"violations": ["string"],
"waivers": ["string"]
}
}
This skill integrates with the following Code Migration/Modernization processes:
Create .vulnerability-scanner.json in the project root:
{
"scanScope": "full",
"severityThreshold": "medium",
"failOnSeverity": "critical",
"databases": ["nvd", "ghsa", "osv"],
"excludeVulnerabilities": [],
"waivers": [
{
"id": "CVE-2021-12345",
"reason": "Not exploitable in our context",
"expiresAt": "2026-06-01"
}
],
"policy": {
"maxCritical": 0,
"maxHigh": 5,
"requirePatchWithin": {
"critical": "7d",
"high": "30d",
"medium": "90d"
}
},
"reporting": {
"formats": ["json", "sarif", "markdown"],
"outputDir": "./security-report"
}
}
When MCP-Scan is available:
// Example MCP security scan
{
"tool": "mcp_scan_security",
"arguments": {
"target": "./",
"checks": ["toolPoisoning", "piiDetection", "promptInjection"]
}
}
When Trivy is available:
// Example Trivy vulnerability scan
{
"tool": "trivy_scan",
"arguments": {
"target": "./",
"scanners": ["vuln", "secret"],
"severity": "CRITICAL,HIGH"
}
}
| Database | Coverage | Update Frequency |
|---|---|---|
| NVD | All CVEs | Hourly |
| GitHub Advisory | Open source packages | Real-time |
| OSV | Multi-ecosystem | Real-time |
| Snyk DB | Proprietary enrichment | Real-time |
| npm Advisory | Node.js packages | Real-time |
| RustSec | Rust packages | Real-time |
| CVSS Score | Severity | Action Required |
|---|---|---|
| 9.0 - 10.0 | Critical | Immediate remediation |
| 7.0 - 8.9 | High | Priority remediation |
| 4.0 - 6.9 | Medium | Scheduled remediation |
| 0.1 - 3.9 | Low | Monitor and plan |
dependency-scanner: Dependency inventory and SBOM generationstatic-code-analyzer: Code-level security analysiscompliance-validator: Compliance checkingsecurity-vulnerability-assessor: Uses this skill for security assessmentdependency-modernization-agent: Uses this skill for security updatesmigration-readiness-assessor: Uses this skill for security evaluationActivates when the user asks about AI prompts, needs prompt templates, wants to search for prompts, or mentions prompts.chat. Use for discovering, retrieving, and improving prompts.
Search, retrieve, and install Agent Skills from the prompts.chat registry using MCP tools. Use when the user asks to find skills, browse skill catalogs, install a skill for Claude, or extend Claude's capabilities with reusable AI agent components.
This skill should be used when the user asks to "create an agent", "add an agent", "write a subagent", "agent frontmatter", "when to use description", "agent examples", "agent tools", "agent colors", "autonomous agent", or needs guidance on agent structure, system prompts, triggering conditions, or agent development best practices for Claude Code plugins.