Analyze Dependabot security advisory and provide resolution strategy
Install with Tessl CLI
npx tessl i github:sc30gsw/claude-code-customes --skill dependabot-check72
Does it follow best practices?
If you maintain this skill, you can automatically optimize it using the tessl CLI to improve its score:
npx tessl skill review --optimize ./path/to/skillValidation for skill structure
Analyze Dependabot security advisory and provide resolution strategy.
/dependabot-check <dependabot_url>Determine URL type and use appropriate command:
/security/dependabot/[number]: Use gh api /repos/[owner]/[repo]/dependabot/alerts/[number]/pull/: Use gh pr view [url] --json title,body,commitsgh api /advisories/[GHSA-ID]git status
pnpm list --depth=0 # Check direct dependencies
pnpm why [package] # Check dependency treeCheck Direct vs Indirect Dependency
Analyze Dependency Tree
pnpm why [package-name]For Direct Dependencies:
pnpm update [package-name]
# Or modify package.json version then
pnpm installFor Indirect Dependencies:
{
"pnpm": {
"overrides": {
"[package-name]": "^[safe-version]"
}
}
}## 🚨 Dependabot Advisory Analysis
**Reference URL**: [url]
### Vulnerable Package
- **Package Name**: [name] ([direct/indirect])
- **Current Version**: [current] → **Recommended**: [recommended]
- **Severity**: [level]
### 🔧 Resolution Strategy
- **Parent Package**: [parent] ([current] → [required])
- **Update Level**: [Major/Minor/Patch]
- **Recommended Method**: [approach]
### 📋 Checklist
- [ ] Verify lock file changes
- [ ] Identify dependency source
- [ ] Check for breaking changes45a1bdf
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.