Dependency Scanner
Scan your package.json for deprecated packages, supply chain attacks, and risky version ranges. Know your risk before you deploy.
Get the CLI Tool
Run the dependency scanner locally as an MCP server, or try it online below.
npx @clinetools/dep-scanner- 25+ known deprecated & sabotaged packages in database
- Supply chain attack detection (event-stream, colors, faker, etc.)
- Risky version range detection (wildcards, loose ranges)
- Risk-ranked output: critical, high, medium, low
- Zero config — just run with npx
How to Use It
Three ways to scan your dependencies — pick the one that fits your workflow.
Try Online
Paste your package.json below to scan for issues — no install needed.
Use via CLI
Run as a local MCP server and connect any MCP-compatible client.
Add to Cline / Claude Code
Add to your MCP settings for instant dependency scanning from your AI assistant.
MCP Client Configuration
{
"mcpServers": {
"dep-scanner": {
"command": "npx",
"args": ["@clinetools/dep-scanner"]
}
}
}Example: Scan for Supply Chain Risks
// Prompt to your AI agent:
"Scan my package.json and flag any packages
with known security issues or supply chain attacks"
// The agent calls:
scan_dependencies({ path: "package.json" })
// Output includes risk-ranked dependencies
// with flags like KNOWN_ISSUE and REPLACEMENTTry It Online
Paste your package.json or try a demo scenario to scan for risky dependencies.
Paste package.json
We check against a database of 25+ known problematic packages
Paste a package.json and click Scan Dependencies to see results.
Flagged Dependencies
Why Dependency Scanning Matters
Your code is only as secure as your weakest dependency. Most projects have hundreds.
Supply Chain Attacks
event-stream, colors, faker, node-ipc — real packages sabotaged by their own maintainers. A single compromised dependency can steal credentials, mine crypto, or wipe data.
Abandoned Packages
Deprecated packages stop getting security patches. Using "request" (deprecated 2020) means any CVE discovered in it will never be fixed. Migration cost only grows over time.
Version Pinning
Wildcard versions ("*") or loose ranges (">=1.0.0") can pull in breaking changes or malicious updates silently. Pin your versions and use lockfiles to control what ships.
Bundle Bloat
Packages like moment.js, lodash, and core-js are huge. Modern alternatives (date-fns, lodash-es, native APIs) are fraction of the size. Scanning helps identify lightweight replacements.
Compliance
SOC 2, ISO 27001, and PCI DSS all require tracking third-party dependencies. Automated scanning gives you an auditable record of what's in your supply chain and what risks you've accepted.
Need Continuous Dependency Monitoring?
Our Pro plan includes automated scans on every commit with Slack alerts for new vulnerabilities.
View Plans