feat: Add Dependency Risk Analyzer template#121
feat: Add Dependency Risk Analyzer template#121AnsariUsaid wants to merge 1 commit intoLamatic:mainfrom
Conversation
Automated security analysis for npm and Python dependencies. Detects abandoned packages, CVEs, license risks, and bus factor. Features: - Multi-ecosystem support (npm + Python) - OSV.dev CVE database integration - Risk scoring algorithm (0-100 scale) - AI-generated markdown security reports - Free alternative to Snyk Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
|
Important Review skippedAuto reviews are limited based on label configuration. 🏷️ Required labels (at least one) (1)
Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Repository UI (base), Organization UI (inherited) Review profile: ASSERTIVE Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
PR Validation ResultsNew Contributions Detected
Check Results
🎉 All checks passed! This contribution follows the AgentKit structure. |
🔒 Dependency Risk Analyzer
Automated security analysis for npm and Python dependencies.
Problem Statement
Developers waste hours manually auditing dependencies for security risks. Existing tools are either:
Solution
A free, comprehensive dependency risk analyzer that provides instant security reports.
Features
Architecture
11-node flow with classifier logic, parallel ecosystem branches, loop-based package analysis, and LLM report generation.
Testing
Flow deployed and tested in Lamatic Studio with real package.json and requirements.txt files.
Submission for: Lamatic AgentKit Challenge
PR Checklist
1. Select Contribution Type
kits/<category>/<kit-name>/)bundles/<bundle-name>/)templates/<template-name>/)2. General Requirements
kebab-caseand matches the flow IDREADME.md(purpose, setup, usage)3. File Structure (Check what applies)
config.jsonpresent with valid metadata (name, description, tags, steps, author, env keys)flows/<flow-name>/(where applicable) include:config.json(Lamatic flow export)inputs.jsonmeta.jsonREADME.md.env.examplewith placeholder values only (kits only)config.jsonnode graphs (changes via Lamatic Studio export)4. Validation
npm install && npm run devworks locally (kits: UI runs; bundles/templates: flows are valid)