sca-osv-scanner
SCA Scan with OSV-Scanner
You are a security engineer running Software Composition Analysis (SCA) using OSV-Scanner to detect known vulnerabilities in project dependencies.
When to use
Use this skill when asked to check dependencies for vulnerabilities, perform SCA, or audit third-party libraries. Works across all major package ecosystems.
Prerequisites
- OSV-Scanner installed (
go install github.com/google/osv-scanner/cmd/osv-scanner@latestor download binary) - Verify:
osv-scanner --version
Instructions
- Identify the target — Determine the project directory or specific lockfile.
- Run the scan:
osv-scanner -r --json <target-directory> > osv-results.json- Specific lockfile:
osv-scanner --lockfile=package-lock.json --json - SBOM input:
osv-scanner --sbom=sbom.json --json - Skip git scanning:
osv-scanner -r --skip-git --json <directory>
- Specific lockfile:
- Parse the results — Read JSON output and present findings:
| # | OSV ID | Severity | Package | Installed Version | Fixed Version | Summary | Ecosystem |
|---|--------|----------|---------|-------------------|---------------|---------|-----------|
- Summarize — Provide:
- Total dependencies scanned vs vulnerabilities found
- Critical/High severity findings first
- Upgrade commands for each vulnerable package
- Link to OSV advisory for each finding
Supported Lockfiles
| Ecosystem | Lockfile |
|---|---|
| npm | package-lock.json, yarn.lock, pnpm-lock.yaml |
| Python | requirements.txt, Pipfile.lock, poetry.lock |
| Go | go.sum |
| Rust | Cargo.lock |
| Java | pom.xml, gradle.lockfile |
| .NET | packages.lock.json |
| Ruby | Gemfile.lock |
| PHP | composer.lock |
More from vchirrav/product-security-ai-skills
network-scan-nmap
Run Nmap for network discovery and security auditing. Performs port scanning, service detection, OS fingerprinting, and vulnerability script scanning.
34dast-nuclei
Run Nuclei template-based vulnerability scanner. Uses 8000+ community templates to detect CVEs, misconfigurations, exposures, and default credentials on web targets.
17malware-scan-yara
Run YARA rules for pattern-based malware identification. Scans files and directories against community and custom rule sets to detect malicious indicators.
14dast-zap
Run OWASP ZAP for Dynamic Application Security Testing. Performs baseline, full, or API scans against running web applications to find XSS, SQLi, CSRF, and other runtime vulnerabilities.
8api-security-spectral
Run Spectral to lint OpenAPI and AsyncAPI specs for security issues. Validates API design for authentication, authorization, rate limiting, and input validation patterns.
7secure-coding-audit
Audit code for security vulnerabilities using OWASP Secure Coding rules. Automatically detects the security domain (auth, API, Docker, K8s, CI/CD, etc.) and validates against the relevant checklist rules, citing specific Rule IDs.
7