Skip to content

feat: Add Dependency Risk Analyzer template#121

Open
AnsariUsaid wants to merge 1 commit intoLamatic:mainfrom
AnsariUsaid:feat/dependency-risk-analyzer-template
Open

feat: Add Dependency Risk Analyzer template#121
AnsariUsaid wants to merge 1 commit intoLamatic:mainfrom
AnsariUsaid:feat/dependency-risk-analyzer-template

Conversation

@AnsariUsaid
Copy link
Copy Markdown

🔒 Dependency Risk Analyzer

Automated security analysis for npm and Python dependencies.

Problem Statement

Developers waste hours manually auditing dependencies for security risks. Existing tools are either:

  • Paid (Snyk)
  • Limited (Dependabot only checks versions)
  • Complex to set up

Solution

A free, comprehensive dependency risk analyzer that provides instant security reports.

Features

  • ✅ Multi-ecosystem support (npm + Python)
  • ✅ CVE detection via OSV.dev database
  • ✅ Abandoned package detection (365+ days)
  • ✅ Bus factor analysis (single-maintainer risk)
  • ✅ License risk detection (GPL, AGPL)
  • ✅ AI-generated markdown reports
  • ✅ Risk scoring (0-100 scale)

Architecture

11-node flow with classifier logic, parallel ecosystem branches, loop-based package analysis, and LLM report generation.

Testing

Flow deployed and tested in Lamatic Studio with real package.json and requirements.txt files.


Submission for: Lamatic AgentKit Challenge


PR Checklist

1. Select Contribution Type

  • Kit (kits/<category>/<kit-name>/)
  • Bundle (bundles/<bundle-name>/)
  • Template (templates/<template-name>/)

2. General Requirements

  • PR is for one project only (no unrelated changes)
  • No secrets, API keys, or real credentials are committed
  • Folder name uses kebab-case and matches the flow ID
  • All changes are documented in README.md (purpose, setup, usage)

3. File Structure (Check what applies)

  • config.json present with valid metadata (name, description, tags, steps, author, env keys)
  • All flows in flows/<flow-name>/ (where applicable) include:
    • config.json (Lamatic flow export)
    • inputs.json
    • meta.json
    • README.md
  • .env.example with placeholder values only (kits only)
  • No hand‑edited flow config.json node graphs (changes via Lamatic Studio export)

4. Validation

  • npm install && npm run dev works locally (kits: UI runs; bundles/templates: flows are valid)
  • PR title is clear
  • GitHub Actions workflows pass (all checks are green) ← Will be checked by CI
  • All CodeRabbit or other PR review comments are addressed and resolved ← Will address if raised
  • No unrelated files or projects are modified

Automated security analysis for npm and Python dependencies.
Detects abandoned packages, CVEs, license risks, and bus factor.

Features:
- Multi-ecosystem support (npm + Python)
- OSV.dev CVE database integration
- Risk scoring algorithm (0-100 scale)
- AI-generated markdown security reports
- Free alternative to Snyk

Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
@coderabbitai
Copy link
Copy Markdown
Contributor

coderabbitai bot commented Apr 3, 2026

Important

Review skipped

Auto reviews are limited based on label configuration.

🏷️ Required labels (at least one) (1)
  • agentkit-challenge

Please check the settings in the CodeRabbit UI or the .coderabbit.yaml file in this repository. To trigger a single review, invoke the @coderabbitai review command.

⚙️ Run configuration

Configuration used: Repository UI (base), Organization UI (inherited)

Review profile: ASSERTIVE

Plan: Pro

Run ID: de713485-9d77-48e8-924e-421d6cbade7d

You can disable this status message by setting the reviews.review_status to false in the CodeRabbit configuration file.

Use the checkbox below for a quick retry:

  • 🔍 Trigger review
✨ Finishing Touches
🧪 Generate unit tests (beta)
  • Create PR with unit tests

Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

@github-actions
Copy link
Copy Markdown

github-actions bot commented Apr 3, 2026

PR Validation Results

New Contributions Detected

  • Template: templates/dependency-risk-analyzer

Check Results

Check Status
No edits to existing projects ✅ Pass
Required root files present ✅ Pass
Flow folder structure valid ✅ Pass
No changes outside contribution dirs ✅ Pass

🎉 All checks passed! This contribution follows the AgentKit structure.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant