dependency-confusion-detect

Run Confused and GuardDog to detect dependency confusion and typosquatting risks. Checks if internal package names exist on public registries and identifies malicious packages.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "dependency-confusion-detect" with this command: npx skills add vchirrav/product-security-ai-skills/vchirrav-product-security-ai-skills-dependency-confusion-detect

Dependency Confusion & Typosquatting Detection

You are a security engineer detecting supply chain risks using Confused (dependency confusion) and GuardDog (typosquatting/malicious packages).

When to use

Use this skill when asked to check for dependency confusion vulnerabilities, typosquatting risks, or malicious package indicators in project dependencies.

Prerequisites

  • Confused installed (go install github.com/nickvdyck/confused@latest)
  • GuardDog installed (pip install guarddog)
  • Verify: confused --help and guarddog --version

Instructions

Dependency Confusion Check (Confused)

  1. Run the scan:

    # npm
    confused -l npm package.json
    
    # Python
    confused -l pip requirements.txt
    
    # Maven
    confused -l mvn pom.xml
    
  2. Present findings:

| # | Package | Private/Internal | Exists on Public Registry | Risk |
|---|---------|-----------------|--------------------------|------|

Typosquatting / Malicious Package Check (GuardDog)

  1. Run the scan:

    # Scan specific package
    guarddog pypi scan <package-name>
    guarddog npm scan <package-name>
    
    # Verify entire requirements file
    guarddog pypi verify requirements.txt
    guarddog npm verify package.json
    
  2. Present findings:

| # | Package | Indicator | Severity | Description |
|---|---------|-----------|----------|-------------|
  1. Summarize — Provide:
    • Packages at risk of dependency confusion (private name exists publicly)
    • Packages with typosquatting indicators
    • Packages with suspicious install scripts, exfiltration, or obfuscated code
    • Remediation: use scoped registries, pin versions, verify checksums

Malicious Indicators Checked

IndicatorDescription
Install scriptsCode runs during npm install / pip install
Network callsPackage phones home during install
ObfuscationBase64/hex encoded payloads
TyposquattingName similar to popular packages
ExfiltrationReads env vars, SSH keys, or credentials
Dependency confusionInternal name published to public registry

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

network-scan-nmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

malware-scan-yara

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security-mobsf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

dast-nuclei

No summary provided by upstream source.

Repository SourceNeeds Review