hound_audit
Scan project lockfiles for dependency vulnerabilities by parsing package managers and querying OSV databases to identify security risks in dependencies.
Instructions
Scan a project's lockfile for dependency risks. Parses package-lock.json, yarn.lock, pnpm-lock.yaml, requirements.txt, Cargo.lock, or go.sum and batch-queries OSV for vulnerabilities across all dependencies.
Input Schema
TableJSON Schema
| Name | Required | Description | Default |
|---|---|---|---|
| lockfile_content | Yes | Full text content of the lockfile | |
| lockfile_name | Yes | Filename to determine format: package-lock.json, yarn.lock, pnpm-lock.yaml, requirements.txt, Cargo.lock, go.sum |