Agent-design-language repo-dependency-review
Specialist dependency and supply-chain reviewer for CodeBuddy-style repository reviews focused on manifests, lockfiles, package manager configuration, toolchains, Docker and CI dependency setup, license-sensitive cues, dependency drift, and dependency-related test gaps without performing upgrades or remediation.
git clone https://github.com/danielbaustin/agent-design-language
T=$(mktemp -d) && git clone --depth=1 https://github.com/danielbaustin/agent-design-language "$T" && mkdir -p ~/.claude/skills && cp -r "$T/adl/tools/skills/repo-dependency-review" ~/.claude/skills/danielbaustin-agent-design-language-repo-dependency-review && rm -rf "$T"
adl/tools/skills/repo-dependency-review/SKILL.mdRepo Dependency Review
Review repository dependency and supply-chain surfaces as one specialist in the CodeBuddy multi-agent review suite. This skill is findings-first and source-grounded. It may inspect code, manifests, lockfiles, Dockerfiles, CI configuration, package-manager configuration, and a CodeBuddy review packet, but it must not edit the repository, upgrade dependencies, or claim merge approval.
Use this skill after
repo-packet-builder has created a bounded review packet,
or when an operator gives an explicit repo/path/diff scope.
Quick Start
- Confirm the target scope:
- repository
- path slice
- branch
- diff
- existing review packet
- Prefer a
packet when available, especiallyrepo-packet-builder
,repo_scope.md
,repo_inventory.json
, andevidence_index.json
.specialist_assignments.json - Run the deterministic scaffold helper when local packet access is available:
scripts/prepare_dependency_review.py <packet-root> --out <artifact-root>
- Inspect dependency and supply-chain surfaces and write a findings-first specialist review artifact.
- Hand final dedupe to
. Hand remediation ideas to a future issue or maintainer-owned upgrade plan, not to this skill.repo-review-synthesis
Focus
Prioritize:
- manifest and lockfile consistency
- unsupported, stale, overbroad, or risky dependency declarations
- package manager configuration and install determinism
- Docker, compose, devcontainer, and runtime image dependency setup
- CI workflow dependency bootstrap and cache behavior
- toolchain version drift across docs, manifests, CI, and lockfiles
- dependency-related test gaps, such as missing install or import smoke tests
- license-sensitive dependency cues that require human or legal follow-up
- supply-chain trust boundaries, including scripts, registries, vendored code, generated dependency files, and pinned versus floating versions
Defer primary ownership of these areas to other specialists:
- implementation correctness:
repo-review-code - security exploitation and abuse paths:
repo-review-security - general missing coverage:
repo-review-tests - documentation truth and onboarding drift:
repo-review-docs - architecture boundaries and layering:
repo-architecture-review - final cross-role dedupe and severity ordering:
repo-review-synthesis
Required Inputs
At minimum, gather:
repo_root- one concrete target:
target.target_pathtarget.branchtarget.diff_basetarget.review_packet_path
Useful additional inputs:
changed_pathsreview_depthartifact_rootexclude_pathsvalidation_modedependency_focus
If there is no concrete repo or packet target, stop and report
blocked.
Workflow
1. Establish Scope
Record:
- review mode
- included dependency surfaces
- excluded dependency surfaces
- assumptions and known limits
- whether the review is dependency-only or part of a multi-agent review
Do not silently expand a path or diff review into a whole-repo review.
2. Map Dependency Surfaces
Look for:
- language manifests and lockfiles
- package manager configuration
- runtime images, Dockerfiles, compose files, and devcontainers
- CI setup, install, cache, and dependency audit steps
- generated or vendored dependency directories
- dependency metadata in docs, demos, examples, and setup scripts
- license files, notices, third-party attributions, and copied code markers
- tests that prove installability, imports, CLI startup, or packaging behavior
3. Review For Dependency Findings
Findings should be behaviorally meaningful. Avoid style-only comments.
Use this priority scale:
: dependency flaw can enable severe compromise, unsafe execution, or broken release artifacts in normal useP0
: install, packaging, lockfile, or supply-chain drift can block users, CI, releases, or trusted review resultsP1
: dependency policy, pinning, cache, or test gaps are likely to cause recurring regressions or unreviewed supply-chain exposureP2
: useful dependency hygiene issue with bounded follow-up valueP3
Each finding should include:
- trigger scenario
- affected dependency surface
- file/path evidence
- impact
- recommended follow-up owner
4. Emit Follow-Up Candidates
Include candidate follow-ups, but do not execute them:
- upgrade or pinning issue candidates
- dependency policy candidates
- install or packaging test candidates
- license review candidates
These are handoff notes, not created issues or performed remediation.
Output Expectations
Default output should include:
- findings first
- assumptions
- reviewed dependency surfaces
- dependency surface map
- candidate supply-chain findings
- candidate dependency test gaps
- candidate license review notes
- validation performed or not run
- residual dependency risk
Use
references/output-contract.md and the shared suite contract in
adl/tools/skills/docs/MULTI_AGENT_REPO_REVIEW_SKILL_SUITE.md.
Stop Boundary
Stop after producing the dependency-review artifact.
Do not:
- edit code, docs, tests, configs, lockfiles, manifests, Dockerfiles, or CI
- install, upgrade, downgrade, pin, unpin, vendor, or remove dependencies
- run external vulnerability feeds or paid data sources
- silently run the whole multi-agent review workflow
- create issues or PRs
- perform license/legal determinations
- downgrade findings from other specialist roles
- claim approval, merge readiness, or remediation completion
CodeBuddy Integration Notes
This skill consumes CodeBuddy packet artifacts and produces a specialist dependency review artifact for synthesis. It is compatible with
repo-packet-builder and should run before repo-review-synthesis when the
operator wants dependency and supply-chain coverage as a first-class review
lane.
Deferred automation:
- Optional SBOM generation and parsing.
- Optional ecosystem-specific vulnerability database integrations.
- License policy allow/deny-list integration.
- Package-manager-specific lockfile consistency analyzers.