docs/tools/dependency_audit
AgenticCode

Dependency Vulnerability Scanner MCP Tool

CLI Tool Name: dependency_audit

Audits project dependencies across multiple ecosystems. Checks every package against the Open Source Vulnerability (OSV) database for known CVEs, and flags outdated versions. Supports Python, Node.js, Go, Java, Ruby, and Rust.

Parameters

ParameterTypeRequiredDescription
directorystringyesRoot directory of the project to audit. Scans recursively for known manifest files.

Supported manifest files

FileEcosystem
requirements.txtPython (pip)
pyproject.tomlPython (modern)
package.jsonNode.js / npm
go.modGo
pom.xmlJava (Maven)
Gemfile.lockRuby (Bundler)
Cargo.tomlRust

Example output

json
{
  "directory": "/path/to/project",
  "manifests_found": ["requirements.txt", "package.json"],
  "findings": [
    {
      "package": "requests",
      "current_version": "2.28.0",
      "latest_version": "2.31.0",
      "severity": "HIGH",
      "cve": "CVE-2023-32681",
      "description": "Unintended leak of Proxy-Authorization header"
    },
    {
      "package": "lodash",
      "current_version": "4.17.20",
      "latest_version": "4.17.21",
      "severity": "MEDIUM",
      "cve": "CVE-2021-23337",
      "description": "Command injection via template"
    }
  ],
  "summary": {
    "critical": 0,
    "high": 1,
    "medium": 1,
    "low": 0,
    "outdated": 3
  }
}
[info]
CVE data comes from the OSV database (osv.dev) — the same source used by GitHub Dependabot and Google's OSS-Fuzz.

Explore other AgenticStore MCP tools

Frequently asked questions