outdated-deps
Vulnerable and Outdated Components Analysis
Analyze project dependencies for known vulnerabilities (CVEs), abandoned packages, unpinned versions, typosquatting risks, and excessive transitive dependency chains. This skill heavily relies on external scanners for CVE detection and uses Claude analysis for configuration hygiene, supply chain risks, and contextual assessment.
Supported Flags
Read ../../shared/schemas/flags.md for full flag
documentation. This skill supports all cross-cutting flags.
Key flags for this skill:
| Flag | Effect |
|---|---|
--scope <value> |
Target scope (default: changed). module: and full are common for dependency audits. |
--depth <value> |
Analysis depth (default: standard). deep traces transitive dependency trees. |
--severity <value> |
Minimum severity to report (default: all). |
--format <value> |
Output format: text, json, sarif, md. |
--fix |
Generate dependency update commands or patches for each finding. |
--explain |
Add CVE details, exploit context, and learning material to each finding. |
Framework Context
OWASP Top 10 2021 -- A06: Vulnerable and Outdated Components
Applications are vulnerable when they use components with known vulnerabilities, do not track component versions, do not scan for vulnerabilities regularly, do not fix or upgrade underlying platforms in a timely fashion, or do not test compatibility of updated libraries.
CWE Mappings:
- CWE-1035: Using Software with Known Vulnerabilities (OWASP Top 10 specific)
- CWE-1104: Use of Unmaintained Third-Party Components
- CWE-937: Using Components with Known Vulnerabilities
STRIDE Mapping: All categories -- the impact depends on the specific vulnerability in the component. A vulnerable serialization library maps to Tampering and Elevation of Privilege; a vulnerable TLS library maps to Information Disclosure.
Detection Patterns
Read references/detection-patterns.md before
running analysis. It contains Grep regex patterns for manifest file issues, lockfile
analysis, and supply chain risk indicators.
Workflow
Step 1 -- Determine Scope
- Parse
--scopeflag (default:changed). - Resolve to a concrete file list.
- Identify dependency manifests and lockfiles in scope:
- Node.js:
package.json,package-lock.json,yarn.lock,pnpm-lock.yaml - Python:
requirements.txt,requirements*.txt,Pipfile,Pipfile.lock,pyproject.toml,poetry.lock,setup.py,setup.cfg - Go:
go.mod,go.sum - Rust:
Cargo.toml,Cargo.lock - Java:
pom.xml,build.gradle,build.gradle.kts,gradle.lockfile - Ruby:
Gemfile,Gemfile.lock - PHP:
composer.json,composer.lock - .NET:
*.csproj,packages.config,Directory.Packages.props - Container:
Dockerfile,docker-compose*.yml
- Node.js:
- If
--scope changedreturns no manifest files, expand to--scope module:<auto>to find the nearest manifest.
Step 2 -- Check for Scanners
Detect available scanners in priority order:
| Scanner | Detect | Ecosystem | Best For |
|---|---|---|---|
| npm audit | which npm |
Node.js | Built-in CVE scanning for npm packages |
| pip-audit | which pip-audit |
Python | CVE scanning for Python packages |
| trivy | which trivy |
Universal | Multi-ecosystem CVE + license scanning |
| osv-scanner | which osv-scanner |
Universal | OSV database lookups across all ecosystems |
| cargo-audit | which cargo-audit |
Rust | CVE scanning for Rust crates |
This skill depends heavily on scanners. If no scanners are available, warn the user prominently and recommend installing at least one. Claude analysis alone cannot reliably detect known CVEs -- it can only check configuration hygiene and supply chain indicators.
Step 3 -- Run Available Scanners
For each detected scanner relevant to the project ecosystem, run against the scoped manifests:
- npm audit:
npm audit --json(from package.json directory) - pip-audit:
pip-audit --format json(from requirements.txt or pyproject.toml directory) - trivy:
trivy fs --format json --scanners vuln <target> - osv-scanner:
osv-scanner --format json -r <target> - cargo-audit:
cargo audit --json(from Cargo.toml directory)
Normalize scanner output to the findings schema per
../../shared/schemas/scanners.md.
Important: Run scanners from the correct working directory. Dependency scanners require being in the project root or the directory containing the manifest file.
Step 4 -- Claude Analysis
Even when scanners are available, Claude adds value by analyzing patterns that scanners
miss. Using Grep and Read, search for patterns from references/detection-patterns.md:
- Unpinned versions: Check manifests for loose version constraints (
^,~,*,>=without upper bound). - Missing lockfiles: Verify that each manifest has a corresponding lockfile committed.
- Abandoned packages: Cross-reference package names with known abandoned or deprecated packages when recognizable.
- Typosquatting risks: Look for package names that are one edit distance from popular packages.
- Excessive dependencies: Flag manifests with unusually large dependency counts that increase attack surface.
- License compliance: Note packages with restrictive or unknown licenses if detectable.
Merge Claude findings with scanner findings, deduplicating by package name and version.
Step 5 -- Report Findings
Output findings using the schema from
../../shared/schemas/findings.md.
Use the DEP prefix for finding IDs (e.g., DEP-001, DEP-002).
Group findings by category:
- Known CVEs (from scanners) -- highest priority
- Unpinned versions -- configuration hygiene
- Missing lockfiles -- supply chain risk
- Abandoned packages -- maintenance risk
- Typosquatting candidates -- supply chain attack risk
- Excessive transitive dependencies -- attack surface
What to Look For
- Known CVEs in direct dependencies -- Vulnerabilities with published CVE identifiers in packages the project directly depends on.
- Known CVEs in transitive dependencies -- Vulnerabilities in packages pulled in indirectly through the dependency tree.
- Unpinned dependency versions -- Version ranges that allow automatic updates
to potentially vulnerable versions (
^,~,*,>=). - Missing lockfiles -- Manifests without committed lockfiles mean builds are not reproducible and dependency resolution can vary.
- Abandoned or unmaintained packages -- Dependencies with no updates in 2+ years, archived repositories, or known deprecation notices.
- Typosquatting candidates -- Package names suspiciously similar to popular
packages (e.g.,
lodahsvslodash,reqeustsvsrequests). - Excessive transitive dependencies -- A single direct dependency pulling in hundreds of transitive packages increases supply chain attack surface.
- Packages from untrusted registries -- Dependencies sourced from non-default registries, private URLs, or git repositories without integrity checks.
- Outdated major versions -- Running multiple major versions behind, even without known CVEs, increases the risk window for future disclosures.
Scanner Integration
See ../../shared/schemas/scanners.md for full scanner
invocation details. This skill primarily uses:
| Scanner | What It Catches |
|---|---|
| npm audit | Known CVEs in npm packages, severity ratings, fix availability |
| pip-audit | Known CVEs in Python packages via PyPI/OSV advisories |
| trivy | Multi-ecosystem CVEs, license issues, Dockerfile base image vulnerabilities |
| osv-scanner | OSV database matches across all ecosystems, including Go, Maven, PyPI, npm |
| cargo-audit | RustSec advisory database matches for Rust crates |
Scanner availability is critical for this skill. Without scanners, the skill can only detect configuration-level issues (unpinned versions, missing lockfiles) but cannot reliably identify known CVEs.
When scanners are unavailable:
- Warn: "No dependency scanner available. CVE detection requires a scanner. Install one of: npm audit (built-in), pip-audit, trivy, osv-scanner."
- Proceed with Claude-only analysis for configuration hygiene patterns.
- Report findings with
confidence: lowfor anything that would need scanner confirmation.
Output Format
All findings use the schema defined in
../../shared/schemas/findings.md.
ID Prefix: DEP (e.g., DEP-001)
References for each finding:
references.owasp:A06:2021references.cwe:CWE-1035(known vulns) orCWE-1104(unmaintained)references.stride: Depends on the specific vulnerabilitymetadata.tool:outdated-depsmetadata.framework:owaspmetadata.category:A06
For CVE findings, also include:
references.cve: The CVE identifier (e.g.,CVE-2023-44270)fix.summary: The fixed version or upgrade command
Summary table after all findings:
| Severity | Count |
|----------|-------|
| CRITICAL | N |
| HIGH | N |
| MEDIUM | N |
| LOW | N |
| Category | Count |
|---------------------------|-------|
| Known CVEs | N |
| Unpinned Versions | N |
| Missing Lockfiles | N |
| Abandoned Packages | N |
| Typosquatting Candidates | N |
| Excessive Dependencies | N |
Followed by:
- Top 3 priorities (usually the highest-severity CVEs)
- Recommended upgrade commands
- Overall dependency health assessment paragraph