Install
openclaw skills install depguardClawHub Security found sensitive or high-impact capabilities. Review the scan results before using.
Dependency audit, vulnerability scanning, and license compliance. Free vuln check + paid continuous monitoring via git hooks.
openclaw skills install depguardDepGuard scans your project dependencies for known vulnerabilities, license violations, and outdated packages. It uses native package manager audit tools (npm audit, pip-audit, cargo-audit, etc.) and enriches results with license analysis and risk scoring.
depguard scan [directory]One-shot vulnerability and license scan of your project dependencies.
How to execute:
bash "<SKILL_DIR>/scripts/depguard.sh" scan [directory]
What it does:
Example usage scenarios:
depguard scan .depguard scan . --licenses-onlydepguard scandepguard report [directory]Generate a formatted dependency health report in markdown.
bash "<SKILL_DIR>/scripts/depguard.sh" report [directory]
depguard hooks installInstall git hooks that scan dependencies on every commit that modifies lockfiles.
bash "<SKILL_DIR>/scripts/depguard.sh" hooks install
What it does:
depguard hooks uninstallRemove DepGuard git hooks.
bash "<SKILL_DIR>/scripts/depguard.sh" hooks uninstall
depguard watch [directory]Continuous monitoring — re-scans on any lockfile change.
bash "<SKILL_DIR>/scripts/depguard.sh" watch [directory]
depguard fix [directory]Auto-fix vulnerabilities by upgrading to patched versions where available.
bash "<SKILL_DIR>/scripts/depguard.sh" fix [directory]
depguard policy [directory]Enforce a dependency policy: block specific licenses, require minimum versions, deny specific packages.
bash "<SKILL_DIR>/scripts/depguard.sh" policy [directory]
depguard sbom [directory]Generate a Software Bill of Materials (SBOM) in CycloneDX or SPDX format.
bash "<SKILL_DIR>/scripts/depguard.sh" sbom [directory]
depguard compliance [directory]Generate a compliance report for auditors — maps licenses to categories (permissive, copyleft, proprietary, unknown).
bash "<SKILL_DIR>/scripts/depguard.sh" compliance [directory]
| Manager | Lockfile | Audit Tool |
|---|---|---|
| npm | package-lock.json | npm audit |
| yarn | yarn.lock | yarn audit |
| pnpm | pnpm-lock.yaml | pnpm audit |
| pip | requirements.txt / Pipfile.lock | pip-audit / safety |
| cargo | Cargo.lock | cargo audit |
| go | go.sum | govulncheck |
| composer | composer.lock | composer audit |
| bundler | Gemfile.lock | bundle audit |
| maven | pom.xml | mvn dependency-check |
| gradle | build.gradle | gradle dependencyCheck |
Add to ~/.openclaw/openclaw.json:
{
"skills": {
"entries": {
"depguard": {
"enabled": true,
"apiKey": "YOUR_LICENSE_KEY",
"config": {
"severityThreshold": "high",
"blockedLicenses": ["GPL-3.0", "AGPL-3.0"],
"allowedLicenses": ["MIT", "Apache-2.0", "BSD-2-Clause", "BSD-3-Clause", "ISC"],
"ignoredVulnerabilities": [],
"autoFix": false,
"sbomFormat": "cyclonedx"
}
}
}
}
}
The user might say things like: