Requirements
- Target platform
- OpenClaw
- Install method
- Manual import
- Extraction
- Extract archive
- Prerequisites
- OpenClaw
- Primary doc
- SKILL.md
Scan project dependencies for vulnerabilities, license compliance, and generate security or compliance reports using native package manager audits.
Scan project dependencies for vulnerabilities, license compliance, and generate security or compliance reports using native package manager audits.
Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.
I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete.
I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run.
DepGuard scans your project dependencies for known vulnerabilities, license violations, and outdated packages. It uses native package manager audit tools (npm audit, pip-audit, cargo-audit, etc.) and enriches results with license analysis and risk scoring.
depguard scan [directory] One-shot vulnerability and license scan of your project dependencies. How to execute: bash "<SKILL_DIR>/scripts/depguard.sh" scan [directory] What it does: Detects package manager (npm, yarn, pnpm, pip, cargo, go, composer, bundler, maven, gradle) Runs native audit commands (npm audit, pip-audit, cargo audit, etc.) Parses dependency manifests for license information Generates a security report with severity levels Lists packages with problematic or unknown licenses Example usage scenarios: "Scan my dependencies for vulnerabilities" โ runs depguard scan . "Check the licenses of my node modules" โ runs depguard scan . --licenses-only "Are any of my packages insecure?" โ runs depguard scan depguard report [directory] Generate a formatted dependency health report in markdown. bash "<SKILL_DIR>/scripts/depguard.sh" report [directory]
depguard hooks install Install git hooks that scan dependencies on every commit that modifies lockfiles. bash "<SKILL_DIR>/scripts/depguard.sh" hooks install What it does: Validates Pro+ license Installs lefthook pre-commit hook targeting lockfile changes On every commit that modifies package-lock.json, yarn.lock, Cargo.lock, etc.: runs vulnerability scan, blocks commit if critical/high vulns found depguard hooks uninstall Remove DepGuard git hooks. bash "<SKILL_DIR>/scripts/depguard.sh" hooks uninstall depguard watch [directory] Continuous monitoring โ re-scans on any lockfile change. bash "<SKILL_DIR>/scripts/depguard.sh" watch [directory] depguard fix [directory] Auto-fix vulnerabilities by upgrading to patched versions where available. bash "<SKILL_DIR>/scripts/depguard.sh" fix [directory]
depguard policy [directory] Enforce a dependency policy: block specific licenses, require minimum versions, deny specific packages. bash "<SKILL_DIR>/scripts/depguard.sh" policy [directory] depguard sbom [directory] Generate a Software Bill of Materials (SBOM) in CycloneDX or SPDX format. bash "<SKILL_DIR>/scripts/depguard.sh" sbom [directory] depguard compliance [directory] Generate a compliance report for auditors โ maps licenses to categories (permissive, copyleft, proprietary, unknown). bash "<SKILL_DIR>/scripts/depguard.sh" compliance [directory]
ManagerLockfileAudit Toolnpmpackage-lock.jsonnpm audityarnyarn.lockyarn auditpnpmpnpm-lock.yamlpnpm auditpiprequirements.txt / Pipfile.lockpip-audit / safetycargoCargo.lockcargo auditgogo.sumgovulncheckcomposercomposer.lockcomposer auditbundlerGemfile.lockbundle auditmavenpom.xmlmvn dependency-checkgradlebuild.gradlegradle dependencyCheck
Add to ~/.openclaw/openclaw.json: { "skills": { "entries": { "depguard": { "enabled": true, "apiKey": "YOUR_LICENSE_KEY", "config": { "severityThreshold": "high", "blockedLicenses": ["GPL-3.0", "AGPL-3.0"], "allowedLicenses": ["MIT", "Apache-2.0", "BSD-2-Clause", "BSD-3-Clause", "ISC"], "ignoredVulnerabilities": [], "autoFix": false, "sbomFormat": "cyclonedx" } } } } }
Free tier works immediately โ no configuration needed All scanning happens locally using native package manager audit tools License validation is offline โ no phone-home Falls back to manifest parsing if native audit tools aren't available Supports monorepos โ scans all workspaces/packages
The user might say things like: "Scan my dependencies for vulnerabilities" "Check my package licenses" "Are any of my npm packages insecure?" "Generate a security audit report" "Set up dependency monitoring" "Block GPL dependencies in this project" "Generate an SBOM" "Check if we're compliant with our license policy"
Identity, auth, scanning, governance, audit, and operational guardrails.
Largest current source with strong distribution and engagement signals.