Scan all project dependencies for known vulnerabilities using Software Composition Analysis. Use when the user says "scan my dependencies", "SCA scan", "vulnerable dependencies", "endor sca", "what's wrong with my deps", or wants a focused dependency vulnerability report with direct vs transitive breakdown. Do NOT use for checking a single package (/endor-check), SAST code scanning (/endor-sast), or quick full scan (/endor-scan).
95
93%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Passed
No known issues
Scan project dependencies for known vulnerabilities.
| Ecosystem | Manifest Files | Lock Files |
|---|---|---|
| JavaScript/TypeScript | package.json | package-lock.json, yarn.lock, pnpm-lock.yaml |
| Python | requirements.txt, pyproject.toml, setup.py, setup.cfg | Pipfile.lock, poetry.lock |
| Go | go.mod | go.sum |
| Java | pom.xml, build.gradle, build.gradle.kts | gradle.lockfile |
| Rust | Cargo.toml | Cargo.lock |
| .NET | *.csproj, packages.config | packages.lock.json |
| Ruby | Gemfile | Gemfile.lock |
| PHP | composer.json | composer.lock |
Identify ecosystem by checking for manifest/lock files in repository root.
Use scan MCP tool:
path: absolute path to repository rootscan_types: ["vulnerabilities", "dependencies"]scan_options: { "quick_scan": true }dependencies resolves the tree; vulnerabilities matches against Endor Labs DB.
CLI fallback (only if MCP genuinely unavailable):
npx -y endorctl scan --path $(pwd) --dependencies --output-type summary -n <namespace>Show exact error messages — do not guess at causes. Suggest /endor-troubleshoot or /endor-setup as appropriate.
For each critical/high finding UUID, use get_resource MCP tool (uuid, resource_type: Finding).
Include: scanned path, ecosystem, dependency count, severity summary table (Critical/High/Medium/Low with counts and actions).
For each critical/high finding:
Distinguish between direct (in manifest, directly upgradable) and transitive (pulled by parent). For transitive vulns, identify the direct dependency that pulls it in.
/endor-fix {top-cve} - fix critical vulnerabilities/endor-check {package} {version} - check specific package/endor-upgrade-impact {package} - analyze upgrade impact/endor-scan-full - full reachability analysis/endor-license - check dependency licensesFor data source policy, read references/data-sources.md.
Show exact error messages — do not guess at causes.
| Error | Action |
|---|---|
| No vulns found | Confirm scan complete, suggest /endor-scan-full for deeper analysis |
| Auth error | Complete browser login, retry. If persistent, /endor-setup |
| No manifest found | List supported ecosystems |
| MCP unavailable | /endor-setup. CLI fallback only if user confirms |
| Unknown error | Show exact error, suggest /endor-troubleshoot |
344e7ff
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.