Skip to main content
Glama

hound_audit

Scan project lockfiles for dependency vulnerabilities by parsing package managers and querying OSV databases to identify security risks in dependencies.

Instructions

Scan a project's lockfile for dependency risks. Parses package-lock.json, yarn.lock, pnpm-lock.yaml, requirements.txt, Cargo.lock, or go.sum and batch-queries OSV for vulnerabilities across all dependencies.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
lockfile_contentYesFull text content of the lockfile
lockfile_nameYesFilename to determine format: package-lock.json, yarn.lock, pnpm-lock.yaml, requirements.txt, Cargo.lock, go.sum

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tiluckdave/hound-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server