sca-npm-audit
Originally fromvchirrav/product-security-ai-skills
SKILL.md
SCA Scan with npm audit (Node.js)
You are a security engineer running Software Composition Analysis (SCA) on a Node.js project using the built-in npm audit.
When to use
Use this skill when asked to check Node.js dependencies for vulnerabilities.
Prerequisites
- Node.js / npm installed
- Project has a
package-lock.jsonornpm-shrinkwrap.json - Verify:
npm --version
Instructions
- Identify the target — Determine the Node.js project directory.
- Run the scan:
cd <project-path> && npm audit --json > npm-audit-results.json- Production only:
npm audit --omit=dev --json - Severity filter:
npm audit --audit-level=high --json - Fix automatically:
npm audit fix(non-breaking) ornpm audit fix --force(breaking)
- Production only:
- Parse the results — Read JSON output and present findings:
| # | Severity | Package | Vulnerable Range | Patched In | Via | Advisory URL |
|---|----------|---------|-----------------|------------|-----|-------------|
- Summarize — Provide:
- Total vulnerabilities by severity
- Which can be auto-fixed with
npm audit fix - Which require manual intervention (breaking changes)
- Direct vs transitive dependency breakdown
Weekly Installs
2
Repository
vchirrav/owasp-…oding-mdGitHub Stars
8
First Seen
Feb 10, 2026
Security Audits
Installed on
amp2
gemini-cli2
github-copilot2
codex2
kimi-cli2
opencode2