Check Dependencies
Weekly supply chain hygiene — scans projects for outdated dependencies, known CVEs, and available updates across npm, pip, cargo, and brew.
Weekly supply chain hygiene — scans projects for outdated dependencies, known CVEs, and available updates across npm, pip, cargo, and brew.
Real data. Real impact.
Emerging
Developers
Per week
Excellent
Skills give you superpowers. Install in 30 seconds.
📦 by @davehappyminion
Scan local projects for outdated packages, known vulnerabilities, and available updates.
Search the user's workspace and common project directories (
~/Projects, ~/src, ~/.openclaw/workspace) for dependency manifests: package.json, requirements.txt, Pipfile, pyproject.toml, Cargo.toml, go.mod.
Group by project root. Skip
node_modules, .venv, target, and build artifact directories.
For each project, check for outdated dependencies using the appropriate package manager. Record: package name, current version, latest version, and whether the update is major, minor, or patch.
Also check Homebrew globally for outdated formulae.
Run security audit tools where available (npm audit, pip-audit, cargo audit, etc.). For each vulnerability found, record: package name, severity, CVE ID if available, and whether a fix version exists.
If the audit tool is not installed for a given ecosystem, skip and note it.
Group findings by priority:
Summarize:
End with: "Scanned X projects. Y vulnerabilities (Z critical). W packages have updates."
node_modules or .venv), audit results may be incomplete. Note this.MIT
curl -o ~/.openclaw/workflows/check-dependencies.md https://raw.githubusercontent.com/nikilster/clawflows/main/workflows/available/community/check-dependencies/WORKFLOW.md1,500+ AI skills, agents & workflows. Install in 30 seconds. Part of the Torly.ai family.
© 2026 Torly.ai. All rights reserved.