Skip to content

Add dependency-scanning skill to advanced-security plugin#33

Open
MabCloud wants to merge 2 commits intogithub:mainfrom
MabCloud:feature/dependency-scanning-skill
Open

Add dependency-scanning skill to advanced-security plugin#33
MabCloud wants to merge 2 commits intogithub:mainfrom
MabCloud:feature/dependency-scanning-skill

Conversation

@MabCloud
Copy link
Copy Markdown

@MabCloud MabCloud commented Apr 16, 2026

What's this?

A new dependency-scanning skill for the advanced-security plugin. Think of it as the sibling of the existing secret-scanning skill, but instead of looking for leaked credentials, it looks for known CVEs and security vulnerabilities in your project's dependencies.

How it works

When you ask something like "are there any vulnerabilities in my dependencies?" or "check my packages for CVEs", the agent will:

  1. Auto-detect your ecosystem by looking for lock files in the project (package-lock.json, yarn.lock, pnpm-lock.yaml, Cargo.lock, Gemfile.lock, go.sum, *.csproj, etc.). Works with monorepos that have multiple ecosystems.
  2. Run the right audit tool for each ecosystem — no configuration needed.
  3. Report findings by severity (Critical → High → Moderate → Low) with CVE IDs, a short description, the advisory link, and the exact command to fix it.
  4. Optionally cross-reference Dependabot alerts from GitHub if the repo has them enabled, using gh api or the REST API.

Supported ecosystems

Ecosystem Tool used
npm
pm audit
Yarn Classic (v1) yarn audit
Yarn Berry (v2+) yarn npm audit
pnpm pnpm audit
Python pip-audit
Rust cargo audit
Ruby bundler-audit
Go govulncheck
.NET dotnet list package --vulnerable

Files changed

  • plugins/advanced-security/skills/dependency-scanning/SKILL.md — the new skill
  • plugins/advanced-security/README.md — updated to document the new skill
  • .github/plugin/marketplace.json — registers dependency-scanning under the advanced-security plugin entry

@MabCloud MabCloud force-pushed the feature/dependency-scanning-skill branch from 1db9331 to 558d976 Compare April 16, 2026 09:56
Add a new skill under plugins/advanced-security/skills/dependency-scanning/
that guides agents through scanning project dependencies for known CVEs and
security vulnerabilities using ecosystem-native audit tools.

Supported ecosystems:
- JavaScript: npm audit, yarn audit (v1 and Berry v2+), pnpm audit
- Python: pip-audit
- Rust: cargo audit
- Ruby: bundler-audit
- Go: govulncheck
- .NET: dotnet list package --vulnerable

The skill covers auto-detection of ecosystems via lock files, running the
appropriate audit command with JSON output, presenting findings grouped by
severity (critical -> high -> moderate -> low), and providing per-ecosystem
remediation commands.

Also fixes marketplace.json: spark plugin was referencing ./skills/spark
which does not exist; the correct path is ./skills/spark-app-template.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@MabCloud MabCloud force-pushed the feature/dependency-scanning-skill branch from 558d976 to 8bd1179 Compare April 16, 2026 13:17
Introduce a new skill that scans project dependencies for known CVEs
and security vulnerabilities using the native audit tool for each
detected package manager.

Supported ecosystems:
- JavaScript: npm audit, yarn audit (v1 and Berry v2+), pnpm audit
- Python: pip-audit
- Rust: cargo audit
- Ruby: bundler-audit
- Go: govulncheck
- .NET: dotnet list package --vulnerable

The skill auto-detects ecosystems from lock files, runs the audit with
JSON output, reports findings by severity (critical, high, moderate,
low) with CVE IDs and fix commands, and optionally cross-references
open Dependabot alerts via gh api or the REST API.

Also registers the skill in marketplace.json and updates the
advanced-security plugin README.

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@MabCloud MabCloud changed the title feat: add dependency-scanning skill for CVE/vulnerability detection Add dependency-scanning skill to advanced-security plugin Apr 16, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant