with one click
ln-625-dependencies-auditor
// Checks outdated packages, unused deps, reinvented wheels, CVE/CVSS vulnerability scan. Use when auditing dependencies.
// Checks outdated packages, unused deps, reinvented wheels, CVE/CVSS vulnerability scan. Use when auditing dependencies.
[HINT] Download the complete skill directory including SKILL.md and all related files
| name | ln-625-dependencies-auditor |
| description | Checks outdated packages, unused deps, reinvented wheels, CVE/CVSS vulnerability scan. Use when auditing dependencies. |
| allowed-tools | Read, Grep, Glob, Bash, mcp__hex-graph__audit_workspace, mcp__hex-graph__find_references, mcp__hex-line__read_file, mcp__hex-line__grep_search, mcp__hex-line__outline |
| license | MIT |
Paths: File paths (
references/,../ln-*) are relative to this skill directory.
Type: L3 Worker
Specialized worker auditing dependency management, code reuse, and security vulnerabilities.
| Param | Values | Default | Description |
|---|---|---|---|
| mode | full / vulnerabilities_only | full | full = all 5 checks, vulnerabilities_only = only CVE scan |
MANDATORY READ: Load references/audit_worker_core_contract.md.
Tool policy: follow host AGENTS.md MCP preferences; load references/mcp_tool_preferences.md and references/mcp_integration_patterns.md only when host policy is absent or MCP behavior is unclear.
Receives contextStore with tech stack, package manifest paths, codebase root, output_dir.
From ln-620 (codebase-auditor): mode=full (default) From ln-760 (security-setup): mode=vulnerabilities_only
Use hex-graph first when dependency references or code reuse evidence materially improve the audit. Use hex-line first for local code reads when available. If MCP is unavailable, unsupported, or not indexed, continue with built-in Read/Grep/Glob/Bash and state the fallback in the report.
Detection policy: use two-layer detection (candidate scan, then context verification); load references/two_layer_detection.md only when the verification method is ambiguous.
references/templates/audit_worker_report_template.md, write to {output_dir}/ln-625--global.md in single Write callMode: full only
Detection:
npm outdated --json (Node.js)pip list --outdated --format=json (Python)cargo outdated --format=json (Rust)Severity:
Recommendation: Update to latest version, test for breaking changes
Effort: S-M (update version, run tests)
Mode: full only
Detection:
import/require statementsSeverity:
Recommendation: Remove from package manifest
Effort: S (delete line, test)
Mode: full only
Detection:
Severity:
Recommendation: Use native alternative
Effort: M (refactor code to use native API)
Mode: full only
Detection:
Severity:
Recommendation: Replace with established library
Effort: M (integrate library, replace calls)
Mode: full AND vulnerabilities_only
Detection:
references/vulnerability_commands.mdreferences/cvss_severity_mapping.mdSeverity:
Fix Classification:
Recommendation: Update to fixed version, verify lock file integrity
Effort: S-L (depends on breaking changes)
MANDATORY READ: Load references/audit_scoring.md.
Note: When mode=vulnerabilities_only, score based only on vulnerability findings.
MANDATORY READ: Load references/templates/audit_worker_report_template.md.
Write JSON summary per references/audit_summary_contract.md. In managed mode the caller passes both runId and summaryArtifactPath; in standalone mode the worker generates its own run-scoped artifact path per shared contract.
Write report to {output_dir}/ln-625--global.md with category: "Dependencies & Reuse" and checks: outdated_packages, unused_deps, available_natives, custom_implementations, vulnerability_scan.
Return summary per references/audit_summary_contract.md.
When summaryArtifactPath is absent, write the standalone runtime summary under .hex-skills/runtime-artifacts/runs/{run_id}/evaluation-worker/{worker}--{identifier}.json and optionally echo the same summary in structured output.
Report written: .hex-skills/runtime-artifacts/runs/{run_id}/audit-report/ln-625--global.md
Score: X.X/10 | Issues: N (C:N H:N M:N L:N)
| File | Purpose |
|---|---|
references/vulnerability_commands.md | Ecosystem-specific audit commands |
references/ci_integration_guide.md | CI/CD integration guidance |
references/cvss_severity_mapping.md | CVSS to severity level mapping |
references/audit_output_schema.md | Audit output schema |
Apply the already-loaded references/audit_worker_core_contract.md.
vulnerabilities_only mode, skip checks 1-4 entirelyreferences/cvss_severity_mapping.mdApply the already-loaded references/audit_worker_core_contract.md.
references/audit_scoring.md{output_dir}/ln-625--global.md (atomic single Write call)Version: 4.0.0 Last Updated: 2026-02-05