Evaluate open source package health before adoption. Use when the user says "should I use this package", "is lodash well-maintained", "endor score express", "package health", "compare lodash vs underscore", "evaluate this dependency", or wants activity, popularity, security, and quality scores. Do NOT use for checking known CVEs in a package (/endor-check) or scanning the whole repo (/endor-scan).
95
93%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Evaluate open source package health before adoption.
Extract from user input:
Use check_dependency_for_risks MCP tool (preferred — checks vulnerabilities AND malware):
ecosystem: npm, python, go, java, maven, rust, dotnet, ruby, phpdependency_name: package nameversion: version to evaluateFallback to check_dependency_for_vulnerabilities if _risks unavailable.
Use CLI to query from OSS namespace:
# Package version info (always redirect stderr when piping)
npx -y endorctl api list --resource PackageVersion -n oss --filter "meta.name=={ecosystem}://{package}@{version}" 2>/dev/null
# Scorecard (use package UUID from above)
npx -y endorctl api list --resource Metric -n oss --filter "meta.name==package_version_scorecard and meta.parent_uuid=={package_uuid}" 2>/dev/nullOr use get_resource MCP tool:
name: {ecosystem}://{package}@{version}, resource_type: PackageVersionresource_type: Metric, name: package_version_scorecard (with package UUID as parent)Present overall score (X/10) with breakdown by category:
| Category | What it measures |
|---|---|
| Activity | Commit frequency, last release, contributors, issue response time |
| Popularity | Downloads, stars, dependents |
| Security | CVE count, security practices, OSSF scorecard, signed releases, security policy |
| Quality | Test coverage, documentation, type support, license |
Include vulnerability history table (CVE, severity, fixed version, date).
Recommendation thresholds:
= 8: Recommended for production
Compare CVEs, score, release date across versions.
Side-by-side table: overall score, activity, popularity, security, quality, CVE count, license. State recommendation with reasoning.
/endor-check {package} - check vulnerabilities/endor-upgrade-impact {package} - upgrade analysis/endor-scan - see impact on your projectFor data source policy, read references/data-sources.md.
| Error | Action |
|---|---|
| Package not found | Check name/ecosystem. OSS namespace may not have indexed it. Do not use external sites |
| Metrics unavailable | Package may be too new or small for scoring |
| Auth error | Run /endor-setup |
344e7ff
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.