Turbo review-dependencies
Detect package managers and discover outdated or vulnerable dependencies. Returns structured findings without upgrading. Use when the user asks to \"review dependencies\", \"check for outdated packages\", \"check dependencies\", \"scan dependencies\", or \"dependency review\".
git clone https://github.com/tobihagemann/turbo
T=$(mktemp -d) && git clone --depth=1 https://github.com/tobihagemann/turbo "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/review-dependencies" ~/.claude/skills/tobihagemann-turbo-review-dependencies && rm -rf "$T"
skills/review-dependencies/SKILL.mdReview Dependencies
Detect package managers and discover outdated or vulnerable dependencies. Analysis only. Does not upgrade.
Step 1: Detect Package Managers
Identify which package managers are in use by searching for config files:
| Config file | Package manager | Lockfile | Ecosystem |
|---|---|---|---|
| npm / yarn / pnpm | / / | Node.js |
, | Swift Package Manager | | Swift |
, , | pip / poetry / uv | , | Python |
| cargo | | Rust |
| Go modules | | Go |
| Bundler | | Ruby |
| Maven | — | Java |
, | Gradle | | Java/Kotlin |
Swift dependencies can live in
Package.swift or be configured directly in the Xcode project file (.xcodeproj/.xcworkspace). For Xcode-managed dependencies, inspect the project's package references.
Detection steps:
- Search for config files in the project root and subdirectories (exclude vendored directories)
- If a lockfile exists, use the corresponding package manager variant (e.g.,
→ yarn,yarn.lock
→ pnpm)pnpm-lock.yaml - If multiple instances of the same package manager found (e.g., monorepo with several
files): usepackage.json
to let the user choose which to review (multiSelect allowed)AskUserQuestion - If multiple package managers found: use
to let the user choose which to reviewAskUserQuestion - If none found: inform user and stop
Step 2: Discovery
Run the appropriate discovery command to find available updates:
| Package manager | Discovery command | Notes |
|---|---|---|
| npm | | Requires . Suggest if missing. |
| yarn | or | |
| pnpm | or | |
| Swift PM | Check resolved versions in against latest releases via WebSearch | No built-in outdated command. Read or inspect the Xcode project to identify dependencies and their current version constraints. |
| pip | | |
| poetry | | |
| uv | | |
| cargo | | Requires . Fall back to comparing versions via WebSearch. |
| Go modules | | |
| Bundler | | |
| Maven | | |
| Gradle | | Requires plugin. |
Categorize updates:
- Major (breaking changes) — requires migration research
- Minor (new features, backward compatible)
- Patch (bug fixes)
Step 3: Report Findings
If the discovery tool is not installed, suggest the installation command (see Step 2 notes column). If no tool exists for the ecosystem, fall back to manual version checking via WebSearch.
If no updates are available, report that dependencies are up to date.
Output Format
Return findings as a numbered list. For each finding:
### [P<N>] <title (imperative, <=80 chars)> **Package:** `<name>` <current> -> <latest> **Manager:** <npm/pip/cargo/etc.> <one paragraph: why this matters, known vulnerabilities if any, major version gap>
After all findings, add:
## Overall Verdict **Dependencies:** <up to date | updates available> <summary with counts: N major, N minor, N patch>
Priority Levels
- P0 — Known security vulnerability (CVE) in the current version
- P1 — Multiple major versions behind (e.g., React 17 → 19)
- P2 — One major version behind or significantly outdated minor versions
- P3 — Minor or patch updates available