security-scanning-security-dependencies▌
sickn33/antigravity-awesome-skills · updated Apr 8, 2026
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across multiple ecosystems to identify vulnerabilities, assess risks, and provide automated remediation strategies.
Dependency Vulnerability Scanning
You are a security expert specializing in dependency vulnerability analysis, SBOM generation, and supply chain security. Scan project dependencies across multiple ecosystems to identify vulnerabilities, assess risks, and provide automated remediation strategies.
Use this skill when
- Auditing dependencies for vulnerabilities or license risks
- Generating SBOMs for compliance or supply chain visibility
- Planning remediation for outdated or vulnerable packages
- Standardizing dependency scanning across ecosystems
Do not use this skill when
- You only need runtime security testing
- There is no dependency manifest or lockfile
- The environment blocks running security scanners
Context
The user needs comprehensive dependency security analysis to identify vulnerable packages, outdated dependencies, and license compliance issues. Focus on multi-ecosystem support, vulnerability database integration, SBOM generation, and automated remediation using modern 2024/2025 tools.
Requirements
$ARGUMENTS
Instructions
- Clarify goals, constraints, and required inputs.
- Apply relevant best practices and validate outcomes.
- Provide actionable steps and verification.
- If detailed examples are required, open
resources/implementation-playbook.md.
Safety
- Avoid running auto-fix or upgrade steps without approval.
- Treat dependency changes as release-impacting and test accordingly.
Resources
resources/implementation-playbook.mdfor detailed patterns and examples.
Discussion
Product Hunt–style comments (not star reviews)- No comments yet — start the thread.
Ratings
4.7★★★★★34 reviews- ★★★★★Diego Anderson· Dec 24, 2024
security-scanning-security-dependencies has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Anika Park· Nov 15, 2024
security-scanning-security-dependencies fits our agent workflows well — practical, well scoped, and easy to wire into existing repos.
- ★★★★★Anika Abbas· Oct 26, 2024
security-scanning-security-dependencies has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Anika Nasser· Oct 6, 2024
We added security-scanning-security-dependencies from the explainx registry; install was straightforward and the SKILL.md answered most questions upfront.
- ★★★★★Maya Agarwal· Sep 25, 2024
security-scanning-security-dependencies reduced setup friction for our internal harness; good balance of opinion and flexibility.
- ★★★★★Sakshi Patil· Sep 13, 2024
Registry listing for security-scanning-security-dependencies matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★William Srinivasan· Sep 9, 2024
security-scanning-security-dependencies has been reliable in day-to-day use. Documentation quality is above average for community skills.
- ★★★★★Ama Gonzalez· Aug 28, 2024
Solid pick for teams standardizing on skills: security-scanning-security-dependencies is focused, and the summary matches what you get after install.
- ★★★★★Anaya Ndlovu· Aug 16, 2024
Registry listing for security-scanning-security-dependencies matched our evaluation — installs cleanly and behaves as described in the markdown.
- ★★★★★Chaitanya Patil· Aug 4, 2024
security-scanning-security-dependencies reduced setup friction for our internal harness; good balance of opinion and flexibility.
showing 1-10 of 34