Claude-code-customes dependabot-check

Analyze Dependabot security advisory and provide resolution strategy

install
source · Clone the upstream repo
git clone https://github.com/sc30gsw/claude-code-customes
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/sc30gsw/claude-code-customes "$T" && mkdir -p ~/.claude/skills && cp -r "$T/.claude/skills/dependabot-check" ~/.claude/skills/sc30gsw-claude-code-customes-dependabot-check && rm -rf "$T"
manifest: .claude/skills/dependabot-check/SKILL.md
source content

Dependabot Check

Analyze Dependabot security advisory and provide resolution strategy.

Usage

/dependabot-check <dependabot_url>

Workflow

Step 1: Gather Advisory Information

Determine URL type and use appropriate command:

  • If URL contains
    /security/dependabot/[number]
    : Use
    gh api /repos/[owner]/[repo]/dependabot/alerts/[number]
  • If URL contains
    /pull/
    : Use
    gh pr view [url] --json title,body,commits
  • If URL contains GitHub Security Advisory ID (GHSA-xxxx): Use
    gh api /advisories/[GHSA-ID]

Step 2: Check Current Project Status

git status
pnpm list --depth=0    # Check direct dependencies
pnpm why [package]     # Check dependency tree

Step 3: Dependency Analysis

  1. Check Direct vs Indirect Dependency

    • Check if package exists in package.json
    • If yes: Direct dependency
    • If no: Indirect dependency
  2. Analyze Dependency Tree

    • Use
      pnpm why [package-name]
    • Identify parent packages

Step 4: Resolution Strategy

For Direct Dependencies:

pnpm update [package-name]
# Or modify package.json version then
pnpm install

For Indirect Dependencies:

  1. Check if parent package update is minor/patch (low risk) or major (high risk)
  2. For minor/patch updates: Update parent package directly
  3. For major updates: Consider using pnpm overrides:
{
  "pnpm": {
    "overrides": {
      "[package-name]": "^[safe-version]"
    }
  }
}

Output Format

## 🚨 Dependabot Advisory Analysis

**Reference URL**: [url]

### Vulnerable Package
- **Package Name**: [name] ([direct/indirect])
- **Current Version**: [current] → **Recommended**: [recommended]
- **Severity**: [level]

### 🔧 Resolution Strategy
- **Parent Package**: [parent] ([current] → [required])
- **Update Level**: [Major/Minor/Patch]
- **Recommended Method**: [approach]

### 📋 Checklist
- [ ] Verify lock file changes
- [ ] Identify dependency source
- [ ] Check for breaking changes