AgenticCode
Dependency Vulnerability Scanner MCP Tool
CLI Tool Name: dependency_audit
Audits project dependencies across multiple ecosystems. Checks every package against the Open Source Vulnerability (OSV) database for known CVEs, and flags outdated versions. Supports Python, Node.js, Go, Java, Ruby, and Rust.
Parameters
| Parameter | Type | Required | Description |
|---|---|---|---|
| directory | string | yes | Root directory of the project to audit. Scans recursively for known manifest files. |
Supported manifest files
| File | Ecosystem |
|---|---|
| requirements.txt | Python (pip) |
| pyproject.toml | Python (modern) |
| package.json | Node.js / npm |
| go.mod | Go |
| pom.xml | Java (Maven) |
| Gemfile.lock | Ruby (Bundler) |
| Cargo.toml | Rust |
Example output
json
{
"directory": "/path/to/project",
"manifests_found": ["requirements.txt", "package.json"],
"findings": [
{
"package": "requests",
"current_version": "2.28.0",
"latest_version": "2.31.0",
"severity": "HIGH",
"cve": "CVE-2023-32681",
"description": "Unintended leak of Proxy-Authorization header"
},
{
"package": "lodash",
"current_version": "4.17.20",
"latest_version": "4.17.21",
"severity": "MEDIUM",
"cve": "CVE-2021-23337",
"description": "Command injection via template"
}
],
"summary": {
"critical": 0,
"high": 1,
"medium": 1,
"low": 0,
"outdated": 3
}
}[info]
CVE data comes from the OSV database (osv.dev) — the same source used by GitHub Dependabot and Google's OSS-Fuzz.