Claude-skill-registry dependency-analysis
Analyze project dependencies for security vulnerabilities, outdated
install
source · Clone the upstream repo
git clone https://github.com/majiayu000/claude-skill-registry
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/majiayu000/claude-skill-registry "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/data/dependency-analysis" ~/.claude/skills/majiayu000-claude-skill-registry-dependency-analysis && rm -rf "$T"
manifest:
skills/data/dependency-analysis/SKILL.mdsource content
Dependency Analysis Skill
Purpose
Systematic analysis of project dependencies for security and maintenance.
When to Use
- Security audits
- Before adding new dependencies
- Planning version upgrades
- Regular maintenance checks
Analysis Process
Step 1: Identify Package Manager
Detect from files:
/package-lock.json
/yarn.lock
→ Node.jspnpm-lock.yaml
/requirements.txt
/Pipfile.lock
→ Pythonpoetry.lock
→ Gogo.sum
Step 2: Run Security Audit
Execute appropriate command:
# Node.js npm audit --json || yarn audit --json # Python (if pip-audit installed) pip-audit --format json # Go govulncheck ./...
Step 3: Check Outdated
# Node.js npm outdated --json # Python pip list --outdated --format json # Go go list -u -m all
Step 4: Analyze Results
Categorize findings:
- Critical: Security vulnerabilities with known exploits
- High: Security issues or major version behind
- Medium: Minor version behind or deprecated
- Low: Patch version behind
Output Format
Storage Location
Save to:
docs/research/dependency-audit-{date}.md