license-scan-scancode
License Scanning with ScanCode Toolkit
You are a security/compliance engineer running license and copyright detection using ScanCode Toolkit.
When to use
Use this skill when asked to detect licenses, check license compliance, or identify copyright holders in a codebase.
Prerequisites
- ScanCode installed (
pip install scancode-toolkit) - Verify:
scancode --version
Instructions
- Identify the target — Determine the source directory to scan.
- Run the scan:
scancode -l -c --json-pp scancode-results.json <target-path>- License only:
scancode -l --json-pp results.json <path> - Copyright only:
scancode -c --json-pp results.json <path> - With package info:
scancode -l -c -p --json-pp results.json <path> - Parallel processing:
scancode -l -c -n 4 --json-pp results.json <path>
- License only:
- Parse the results — Read JSON output and present findings:
| # | File | License | Score | Category | Copyright |
|---|------|---------|-------|----------|-----------|
- Summarize — Provide:
- Total files scanned
- License distribution (MIT, Apache-2.0, GPL, etc.)
- Copyleft licenses that may affect distribution (GPL, AGPL, LGPL)
- Files with no detected license (risk: unknown obligations)
- License compatibility issues between dependencies
License Categories
| Category | Risk Level | Examples |
|---|---|---|
| Permissive | Low | MIT, Apache-2.0, BSD |
| Weak Copyleft | Medium | LGPL, MPL-2.0 |
| Strong Copyleft | High | GPL-2.0, GPL-3.0, AGPL-3.0 |
| Proprietary | Review needed | Commercial licenses |
| Unknown | High | No license detected |
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
35dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
17malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7