From hatch3r
Audits npm dependencies for security vulnerabilities, outdated versions, and bundle size impact; plans and implements upgrades with CVE research and testing. Use for dep audits, CVE fixes, package updates.
npx claudepluginhub hatch3r/hatch3rThis skill uses the workspace's default tool permissions.
> **Note:** Commands below use `npm` as an example. Substitute with your project's package manager (`yarn`, `pnpm`, `bun`) or build tool when your project uses a different package manager.
Audits project dependencies for CVEs using detected package manager, reports vulnerabilities with installed/fixed versions and exact upgrade commands. Includes auto-fix and banned-packages check.
Audits vulnerabilities, checks outdated packages, analyzes dependency trees with npm explain/ls/why, finds unused deps via depcheck, and upgrades packages safely using npm/yarn/pnpm.
Share bugs, ideas, or general feedback.
Note: Commands below use
npmas an example. Substitute with your project's package manager (yarn,pnpm,bun) or build tool when your project uses a different package manager.
Task Progress:
- [ ] Step 1: Run npm audit + npm outdated, categorize findings
- [ ] Step 2: Research CVEs via web search for critical/high
- [ ] Step 3: Plan upgrades (breaking vs non-breaking, bundle impact)
- [ ] Step 4: Implement upgrades one-by-one, run tests after each
- [ ] Step 5: Verify quality gates and bundle size
- [ ] Step 6: Open PR with upgrade rationale
npm audit and capture output. Categorize by severity: critical, high, moderate, low.npm outdated to identify packages with newer versions.For critical and high vulnerabilities:
platform in .agents/hatch.json):
gh api /repos/{owner}/{repo}/security-advisories)Before changing anything:
npm run build and measure before/after for each upgrade.npm install, then npm run lint && npm run typecheck && npm run test.package-lock.json — never use npm install --no-save.npm run lint && npm run typecheck && npm run test
npm run build
npm audit — no critical or high vulnerabilities remaining.package-lock.json is committed by checking git status for untracked or modified lockfile.Use the project's PR template. Include:
npm audit reports vulnerabilities with no fix available: Document the vulnerability, assess exploitability in the project context, and create a tracking issue. If the risk is high, evaluate alternative packages.rm package-lock.json && npm install), verify all tests pass, and commit the clean lockfile.package-lock.json committed