This skill does NOT scan source code for CVEs or credentials. It evaluates dependency health and maintainer risk.Author: Spencer Michaels
Installation
Overview
The plugin enumerates all direct dependencies of a target project, then uses thegh command-line tool to query information about each dependency including:
- Maintainer identities and count
- Commit history and update frequency
- Security contacts
- CVE history
- Popularity metrics (stars, downloads)
When to Use
Use this plugin when:- A client is concerned about supply-chain threats to their application
- Identifying dependencies at highest risk of takeover or compromise
- Evaluating dependency health before a security audit
- Assessing supply chain attack surface of a project
- Pre-engagement scoping for supply chain concerns
- Looking to replace dependencies with better-secured alternatives
When NOT to Use
Do NOT use this plugin for:- Active vulnerability scanning - Use dedicated tools like
npm audit,pip-audit, or Dependabot - Runtime dependency analysis - This analyzes declared dependencies, not runtime behavior
- License compliance auditing - Use license scanning tools instead
Risk Criteria
A dependency is flagged as high-risk if it exhibits any of these factors:Single Maintainer or Small Team
Single Maintainer or Small Team
Risk: The project is primarily maintained by a single individual or small group, not backed by an organization.Special Cases:
- Lower risk: Extremely prolific contributors like
sindresorhusor Drew Devault - Higher risk: Anonymous maintainers whose GitHub identity isn’t tied to real-world identity
Unmaintained
Unmaintained
Indicators:
- No updates for a long period
- Explicitly deprecated or archived
- README notes project is inactive or seeking maintainers
- Large number of unresponded bug/security issues (feature requests don’t count)
Low Popularity
Low Popularity
Indicators:
- Relatively low number of GitHub stars compared to other dependencies
- Low download counts relative to the ecosystem
High-Risk Features
High-Risk Features
Examples:
- FFI (Foreign Function Interface)
- Deserialization
- Third-party code execution
- Shell command execution
- Cryptographic implementations
Presence of Past CVEs
Presence of Past CVEs
Evaluation:
- High or critical severity CVEs
- Large number of CVEs relative to popularity and complexity
- Recent unpatched CVEs
Absence of Security Contact
Absence of Security Contact
Missing from:
.github/SECURITY.mdCONTRIBUTING.mdREADME.md- Project website
Prerequisites
Workflow
Phase 1: Initial Setup
- Create workspace directory -
.supply-chain-risk-auditor/ - Initialize report - Start
results.mdbased on template - Find dependency repositories - Extract git URLs for all direct dependencies
- Normalize URLs - Convert
name/projectformat to full GitHub URLs
Phase 2: Dependency Audit
For each dependency, evaluate risk according to criteria:Query Exact Data
Use
gh tool to query:- Number of maintainers
- Star count
- Open issues (bug/security only)
- Last commit date
- Security policy presence
- CVE history
Phase 3: Post-Audit
-
Suggest Alternatives - For each high-risk dependency, find:
- Direct successors or drop-in replacements
- More popular, better-maintained alternatives
- Similar functionality with better security posture
- Provide short justification for each suggestion
-
Summarize Findings - Fill out:
- Counts by Risk Factor table
- Executive Summary with overall security posture
- Recommendations section
Report Structure
The generatedresults.md includes:
Do not add sections beyond those in the template. Keep the report focused and actionable.
Example Risk Assessment
Evaluation Example
When assessing a dependency likeexample-pkg:
Best Practices
Be Objective
Base assessments on measurable data, not assumptions. Use
gh to get exact numbers.Provide Context
Explain why a dependency is flagged and what makes the alternative better.
Prioritize Impact
Focus on dependencies with highest risk exposure and usage in critical paths.
Suggest Actionable Alternatives
Recommend realistic replacements, preferably drop-in or well-documented migrations.
Related Skills
Static Analysis
Scan dependency code for vulnerabilities
Audit Context Building
Deep architectural analysis before auditing