docs/tools/dependency_audit
AgenticCode

Dependency Vulnerability Scanner MCP Tool

CLI Tool Name: dependency_audit

Audits project dependencies across multiple ecosystems. Checks every package against the Open Source Vulnerability (OSV) database for known CVEs, and flags outdated versions. Supports Python, Node.js, Go, Java, Ruby, and Rust.

Parameters

ParameterTypeRequiredDescription
directorystringyesRoot directory of the project to audit. Scans recursively for known manifest files.

Supported manifest files

FileEcosystem
requirements.txtPython (pip)
pyproject.tomlPython (modern)
package.jsonNode.js / npm
go.modGo
pom.xmlJava (Maven)
Gemfile.lockRuby (Bundler)
Cargo.tomlRust

Example output

json
{
  "directory": "/path/to/project",
  "manifests_found": ["requirements.txt", "package.json"],
  "findings": [
    {
      "package": "requests",
      "current_version": "2.28.0",
      "latest_version": "2.31.0",
      "severity": "HIGH",
      "cve": "CVE-2023-32681",
      "description": "Unintended leak of Proxy-Authorization header"
    },
    {
      "package": "lodash",
      "current_version": "4.17.20",
      "latest_version": "4.17.21",
      "severity": "MEDIUM",
      "cve": "CVE-2021-23337",
      "description": "Command injection via template"
    }
  ],
  "summary": {
    "critical": 0,
    "high": 1,
    "medium": 1,
    "low": 0,
    "outdated": 3
  }
}
[info]
CVE data comes from the OSV database (osv.dev) — the same source used by GitHub Dependabot and Google's OSS-Fuzz.

Client integrations

Learn how to connect the dependency_audit tool to your AI agent:

Explore other AgenticStore MCP tools

Frequently asked questions