Dependency Scanning
Automatically detect vulnerabilities in your project dependencies across all major package ecosystems.
Overview
QODRYX dependency scanning analyzes your project package manifests and lock files to identify:
- Known Vulnerabilities (CVEs) — Security flaws in your dependencies with severity ratings
- Outdated Packages — Dependencies with available updates and security patches
- License Compliance — Detect copyleft or incompatible licenses in your supply chain
Supported Package Ecosystems
npm / yarn / pnpm
package.json, package-lock.json, yarn.lock, pnpm-lock.yaml
Python (pip)
requirements.txt, Pipfile, Pipfile.lock, pyproject.toml
Go
go.mod, go.sum
Ruby
Gemfile, Gemfile.lock
PHP (Composer)
composer.json, composer.lock
Rust (Cargo)
Cargo.toml, Cargo.lock
.NET (NuGet)
*.csproj, packages.config
Java (Maven/Gradle)
pom.xml, build.gradle
How It Works
Parse Dependencies
QODRYX reads your manifest and lock files to build a complete dependency tree, including transitive dependencies.
Query Vulnerability Databases
Each dependency is checked against NVD, GitHub Advisory Database, OSV, and ecosystem-specific databases.
Generate Report
Results are presented with severity ratings, CVE details, affected versions, and upgrade recommendations.
Configuration
Configure dependency scanning in your qodryx.config.json:
{
"security": {
"dependencies": {
"enabled": true,
"failOnSeverity": "high",
"ignoredCVEs": [
"CVE-2021-12345"
],
"licenseDenylist": [
"GPL-3.0",
"AGPL-3.0"
],
"scanDevDependencies": false
}
}
}CLI Usage
# Run dependency scan qodryx scan --dependencies # Scan with specific severity threshold qodryx scan --dependencies --fail-on high # Generate SBOM (Software Bill of Materials) qodryx sbom --format spdx # Check for updates qodryx deps --outdated
Example Scan Results
Prototype pollution vulnerability in lodash before 4.17.21.
Best Practices
- Always commit lock files to ensure reproducible builds and accurate scanning
- Enable automated PR comments to catch vulnerabilities before merge
- Set up scheduled scans to detect newly disclosed CVEs
- Use the SBOM export for compliance and supply chain transparency
- Configure severity thresholds to match your security policy