{
  "schemaVersion": "1.0",
  "item": {
    "slug": "depguard",
    "name": "DepGuard",
    "source": "tencent",
    "type": "skill",
    "category": "安全合规",
    "sourceUrl": "https://clawhub.ai/suhteevah/depguard",
    "canonicalUrl": "https://clawhub.ai/suhteevah/depguard",
    "targetPlatform": "OpenClaw"
  },
  "install": {
    "downloadMode": "redirect",
    "downloadUrl": "/downloads/depguard",
    "sourceDownloadUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=depguard",
    "sourcePlatform": "tencent",
    "targetPlatform": "OpenClaw",
    "installMethod": "Manual import",
    "extraction": "Extract archive",
    "prerequisites": [
      "OpenClaw"
    ],
    "packageFormat": "ZIP package",
    "includedAssets": [
      "config/lefthook.yml",
      "README.md",
      "scripts/depguard.sh",
      "scripts/hooks.sh",
      "scripts/license.sh",
      "scripts/policy.sh"
    ],
    "primaryDoc": "SKILL.md",
    "quickSetup": [
      "Download the package from Yavira.",
      "Extract the archive and review SKILL.md first.",
      "Import or place the package into your OpenClaw setup."
    ],
    "agentAssist": {
      "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
      "steps": [
        "Download the package from Yavira.",
        "Extract it into a folder your agent can access.",
        "Paste one of the prompts below and point your agent at the extracted folder."
      ],
      "prompts": [
        {
          "label": "New install",
          "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
        },
        {
          "label": "Upgrade existing",
          "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
        }
      ]
    },
    "sourceHealth": {
      "source": "tencent",
      "status": "healthy",
      "reason": "direct_download_ok",
      "recommendedAction": "download",
      "checkedAt": "2026-04-23T16:43:11.935Z",
      "expiresAt": "2026-04-30T16:43:11.935Z",
      "httpStatus": 200,
      "finalUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
      "contentType": "application/zip",
      "probeMethod": "head",
      "details": {
        "probeUrl": "https://wry-manatee-359.convex.site/api/v1/download?slug=4claw-imageboard",
        "contentDisposition": "attachment; filename=\"4claw-imageboard-1.0.1.zip\"",
        "redirectLocation": null,
        "bodySnippet": null
      },
      "scope": "source",
      "summary": "Source download looks usable.",
      "detail": "Yavira can redirect you to the upstream package for this source.",
      "primaryActionLabel": "Download for OpenClaw",
      "primaryActionHref": "/downloads/depguard"
    },
    "validation": {
      "installChecklist": [
        "Use the Yavira download entry.",
        "Review SKILL.md after the package is downloaded.",
        "Confirm the extracted package contains the expected setup assets."
      ],
      "postInstallChecks": [
        "Confirm the extracted package includes the expected docs or setup files.",
        "Validate the skill or prompts are available in your target agent workspace.",
        "Capture any manual follow-up steps the agent could not complete."
      ]
    },
    "downloadPageUrl": "https://openagent3.xyz/downloads/depguard",
    "agentPageUrl": "https://openagent3.xyz/skills/depguard/agent",
    "manifestUrl": "https://openagent3.xyz/skills/depguard/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/depguard/agent.md"
  },
  "agentAssist": {
    "summary": "Hand the extracted package to your coding agent with a concrete install brief instead of figuring it out manually.",
    "steps": [
      "Download the package from Yavira.",
      "Extract it into a folder your agent can access.",
      "Paste one of the prompts below and point your agent at the extracted folder."
    ],
    "prompts": [
      {
        "label": "New install",
        "body": "I downloaded a skill package from Yavira. Read SKILL.md from the extracted folder and install it by following the included instructions. Then review README.md for any prerequisites, environment setup, or post-install checks. Tell me what you changed and call out any manual steps you could not complete."
      },
      {
        "label": "Upgrade existing",
        "body": "I downloaded an updated skill package from Yavira. Read SKILL.md from the extracted folder, compare it with my current installation, and upgrade it while preserving any custom configuration unless the package docs explicitly say otherwise. Then review README.md for any prerequisites, environment setup, or post-install checks. Summarize what changed and any follow-up checks I should run."
      }
    ]
  },
  "documentation": {
    "source": "clawhub",
    "primaryDoc": "SKILL.md",
    "sections": [
      {
        "title": "DepGuard — Dependency Audit & License Compliance",
        "body": "DepGuard scans your project dependencies for known vulnerabilities, license violations, and outdated packages. It uses native package manager audit tools (npm audit, pip-audit, cargo-audit, etc.) and enriches results with license analysis and risk scoring."
      },
      {
        "title": "Free Tier (No license required)",
        "body": "depguard scan [directory]\n\nOne-shot vulnerability and license scan of your project dependencies.\n\nHow to execute:\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" scan [directory]\n\nWhat it does:\n\nDetects package manager (npm, yarn, pnpm, pip, cargo, go, composer, bundler, maven, gradle)\nRuns native audit commands (npm audit, pip-audit, cargo audit, etc.)\nParses dependency manifests for license information\nGenerates a security report with severity levels\nLists packages with problematic or unknown licenses\n\nExample usage scenarios:\n\n\"Scan my dependencies for vulnerabilities\" → runs depguard scan .\n\"Check the licenses of my node modules\" → runs depguard scan . --licenses-only\n\"Are any of my packages insecure?\" → runs depguard scan\n\ndepguard report [directory]\n\nGenerate a formatted dependency health report in markdown.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" report [directory]"
      },
      {
        "title": "Pro Tier ($19/user/month — requires DEPGUARD_LICENSE_KEY)",
        "body": "depguard hooks install\n\nInstall git hooks that scan dependencies on every commit that modifies lockfiles.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" hooks install\n\nWhat it does:\n\nValidates Pro+ license\nInstalls lefthook pre-commit hook targeting lockfile changes\nOn every commit that modifies package-lock.json, yarn.lock, Cargo.lock, etc.: runs vulnerability scan, blocks commit if critical/high vulns found\n\ndepguard hooks uninstall\n\nRemove DepGuard git hooks.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" hooks uninstall\n\ndepguard watch [directory]\n\nContinuous monitoring — re-scans on any lockfile change.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" watch [directory]\n\ndepguard fix [directory]\n\nAuto-fix vulnerabilities by upgrading to patched versions where available.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" fix [directory]"
      },
      {
        "title": "Team Tier ($39/user/month — requires DEPGUARD_LICENSE_KEY with team tier)",
        "body": "depguard policy [directory]\n\nEnforce a dependency policy: block specific licenses, require minimum versions, deny specific packages.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" policy [directory]\n\ndepguard sbom [directory]\n\nGenerate a Software Bill of Materials (SBOM) in CycloneDX or SPDX format.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" sbom [directory]\n\ndepguard compliance [directory]\n\nGenerate a compliance report for auditors — maps licenses to categories (permissive, copyleft, proprietary, unknown).\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" compliance [directory]"
      },
      {
        "title": "Supported Package Managers",
        "body": "ManagerLockfileAudit Toolnpmpackage-lock.jsonnpm audityarnyarn.lockyarn auditpnpmpnpm-lock.yamlpnpm auditpiprequirements.txt / Pipfile.lockpip-audit / safetycargoCargo.lockcargo auditgogo.sumgovulncheckcomposercomposer.lockcomposer auditbundlerGemfile.lockbundle auditmavenpom.xmlmvn dependency-checkgradlebuild.gradlegradle dependencyCheck"
      },
      {
        "title": "Configuration",
        "body": "Add to ~/.openclaw/openclaw.json:\n\n{\n  \"skills\": {\n    \"entries\": {\n      \"depguard\": {\n        \"enabled\": true,\n        \"apiKey\": \"YOUR_LICENSE_KEY\",\n        \"config\": {\n          \"severityThreshold\": \"high\",\n          \"blockedLicenses\": [\"GPL-3.0\", \"AGPL-3.0\"],\n          \"allowedLicenses\": [\"MIT\", \"Apache-2.0\", \"BSD-2-Clause\", \"BSD-3-Clause\", \"ISC\"],\n          \"ignoredVulnerabilities\": [],\n          \"autoFix\": false,\n          \"sbomFormat\": \"cyclonedx\"\n        }\n      }\n    }\n  }\n}"
      },
      {
        "title": "Important Notes",
        "body": "Free tier works immediately — no configuration needed\nAll scanning happens locally using native package manager audit tools\nLicense validation is offline — no phone-home\nFalls back to manifest parsing if native audit tools aren't available\nSupports monorepos — scans all workspaces/packages"
      },
      {
        "title": "When to Use DepGuard",
        "body": "The user might say things like:\n\n\"Scan my dependencies for vulnerabilities\"\n\"Check my package licenses\"\n\"Are any of my npm packages insecure?\"\n\"Generate a security audit report\"\n\"Set up dependency monitoring\"\n\"Block GPL dependencies in this project\"\n\"Generate an SBOM\"\n\"Check if we're compliant with our license policy\""
      }
    ],
    "body": "DepGuard — Dependency Audit & License Compliance\n\nDepGuard scans your project dependencies for known vulnerabilities, license violations, and outdated packages. It uses native package manager audit tools (npm audit, pip-audit, cargo-audit, etc.) and enriches results with license analysis and risk scoring.\n\nCommands\nFree Tier (No license required)\ndepguard scan [directory]\n\nOne-shot vulnerability and license scan of your project dependencies.\n\nHow to execute:\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" scan [directory]\n\n\nWhat it does:\n\nDetects package manager (npm, yarn, pnpm, pip, cargo, go, composer, bundler, maven, gradle)\nRuns native audit commands (npm audit, pip-audit, cargo audit, etc.)\nParses dependency manifests for license information\nGenerates a security report with severity levels\nLists packages with problematic or unknown licenses\n\nExample usage scenarios:\n\n\"Scan my dependencies for vulnerabilities\" → runs depguard scan .\n\"Check the licenses of my node modules\" → runs depguard scan . --licenses-only\n\"Are any of my packages insecure?\" → runs depguard scan\ndepguard report [directory]\n\nGenerate a formatted dependency health report in markdown.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" report [directory]\n\nPro Tier ($19/user/month — requires DEPGUARD_LICENSE_KEY)\ndepguard hooks install\n\nInstall git hooks that scan dependencies on every commit that modifies lockfiles.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" hooks install\n\n\nWhat it does:\n\nValidates Pro+ license\nInstalls lefthook pre-commit hook targeting lockfile changes\nOn every commit that modifies package-lock.json, yarn.lock, Cargo.lock, etc.: runs vulnerability scan, blocks commit if critical/high vulns found\ndepguard hooks uninstall\n\nRemove DepGuard git hooks.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" hooks uninstall\n\ndepguard watch [directory]\n\nContinuous monitoring — re-scans on any lockfile change.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" watch [directory]\n\ndepguard fix [directory]\n\nAuto-fix vulnerabilities by upgrading to patched versions where available.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" fix [directory]\n\nTeam Tier ($39/user/month — requires DEPGUARD_LICENSE_KEY with team tier)\ndepguard policy [directory]\n\nEnforce a dependency policy: block specific licenses, require minimum versions, deny specific packages.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" policy [directory]\n\ndepguard sbom [directory]\n\nGenerate a Software Bill of Materials (SBOM) in CycloneDX or SPDX format.\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" sbom [directory]\n\ndepguard compliance [directory]\n\nGenerate a compliance report for auditors — maps licenses to categories (permissive, copyleft, proprietary, unknown).\n\nbash \"<SKILL_DIR>/scripts/depguard.sh\" compliance [directory]\n\nSupported Package Managers\nManager\tLockfile\tAudit Tool\nnpm\tpackage-lock.json\tnpm audit\nyarn\tyarn.lock\tyarn audit\npnpm\tpnpm-lock.yaml\tpnpm audit\npip\trequirements.txt / Pipfile.lock\tpip-audit / safety\ncargo\tCargo.lock\tcargo audit\ngo\tgo.sum\tgovulncheck\ncomposer\tcomposer.lock\tcomposer audit\nbundler\tGemfile.lock\tbundle audit\nmaven\tpom.xml\tmvn dependency-check\ngradle\tbuild.gradle\tgradle dependencyCheck\nConfiguration\n\nAdd to ~/.openclaw/openclaw.json:\n\n{\n  \"skills\": {\n    \"entries\": {\n      \"depguard\": {\n        \"enabled\": true,\n        \"apiKey\": \"YOUR_LICENSE_KEY\",\n        \"config\": {\n          \"severityThreshold\": \"high\",\n          \"blockedLicenses\": [\"GPL-3.0\", \"AGPL-3.0\"],\n          \"allowedLicenses\": [\"MIT\", \"Apache-2.0\", \"BSD-2-Clause\", \"BSD-3-Clause\", \"ISC\"],\n          \"ignoredVulnerabilities\": [],\n          \"autoFix\": false,\n          \"sbomFormat\": \"cyclonedx\"\n        }\n      }\n    }\n  }\n}\n\nImportant Notes\nFree tier works immediately — no configuration needed\nAll scanning happens locally using native package manager audit tools\nLicense validation is offline — no phone-home\nFalls back to manifest parsing if native audit tools aren't available\nSupports monorepos — scans all workspaces/packages\nWhen to Use DepGuard\n\nThe user might say things like:\n\n\"Scan my dependencies for vulnerabilities\"\n\"Check my package licenses\"\n\"Are any of my npm packages insecure?\"\n\"Generate a security audit report\"\n\"Set up dependency monitoring\"\n\"Block GPL dependencies in this project\"\n\"Generate an SBOM\"\n\"Check if we're compliant with our license policy\""
  },
  "trust": {
    "sourceLabel": "tencent",
    "provenanceUrl": "https://clawhub.ai/suhteevah/depguard",
    "publisherUrl": "https://clawhub.ai/suhteevah/depguard",
    "owner": "suhteevah",
    "version": "1.0.1",
    "license": null,
    "verificationStatus": "Indexed source record"
  },
  "links": {
    "detailUrl": "https://openagent3.xyz/skills/depguard",
    "downloadUrl": "https://openagent3.xyz/downloads/depguard",
    "agentUrl": "https://openagent3.xyz/skills/depguard/agent",
    "manifestUrl": "https://openagent3.xyz/skills/depguard/agent.json",
    "briefUrl": "https://openagent3.xyz/skills/depguard/agent.md"
  }
}