depguard_remediate
Build a prioritized remediation plan by grouping vulnerable transitive dependencies under their direct dependencies, sorted by severity weight to identify the highest-impact upgrades.
Instructions
Build a remediation plan for a project with known vulnerabilities. Reads package.json + lock file, runs the same audit as depguard_audit_project, then groups every vulnerable transitive under the direct dep that pulls it in. Output is sorted by severity weight so the first remediation is the highest-impact bump. Use this when the user is staring at "100 vulnerabilities found" from npm install and needs to know which 5 direct deps to upgrade. Read-only: never modifies package.json, lockfile, or runs npm.
Input Schema
| Name | Required | Description | Default |
|---|---|---|---|
| path | Yes | Absolute path to package.json file | |
| includeDevDependencies | No | Include devDependencies in audit (default: false) | |
| targetLicense | No | Project license for compatibility check (auto-detected from package.json if not set) |