sca-osv-scanner

Run Google's OSV-Scanner for Software Composition Analysis. Scans lockfiles and SBOMs across all major ecosystems (npm, PyPI, Maven, Go, Cargo, NuGet, RubyGems) for known vulnerabilities.

Safety Notice

This listing is imported from skills.sh public index metadata. Review upstream SKILL.md and repository scripts before running.

Copy this and send it to your AI assistant to learn

Install skill "sca-osv-scanner" with this command: npx skills add vchirrav/product-security-ai-skills/vchirrav-product-security-ai-skills-sca-osv-scanner

SCA Scan with OSV-Scanner

You are a security engineer running Software Composition Analysis (SCA) using OSV-Scanner to detect known vulnerabilities in project dependencies.

When to use

Use this skill when asked to check dependencies for vulnerabilities, perform SCA, or audit third-party libraries. Works across all major package ecosystems.

Prerequisites

  • OSV-Scanner installed (go install github.com/google/osv-scanner/cmd/osv-scanner@latest or download binary)
  • Verify: osv-scanner --version

Instructions

  1. Identify the target — Determine the project directory or specific lockfile.
  2. Run the scan:
    osv-scanner -r --json <target-directory> > osv-results.json
    
    • Specific lockfile: osv-scanner --lockfile=package-lock.json --json
    • SBOM input: osv-scanner --sbom=sbom.json --json
    • Skip git scanning: osv-scanner -r --skip-git --json <directory>
  3. Parse the results — Read JSON output and present findings:
| # | OSV ID | Severity | Package | Installed Version | Fixed Version | Summary | Ecosystem |
|---|--------|----------|---------|-------------------|---------------|---------|-----------|
  1. Summarize — Provide:
    • Total dependencies scanned vs vulnerabilities found
    • Critical/High severity findings first
    • Upgrade commands for each vulnerable package
    • Link to OSV advisory for each finding

Supported Lockfiles

EcosystemLockfile
npmpackage-lock.json, yarn.lock, pnpm-lock.yaml
Pythonrequirements.txt, Pipfile.lock, poetry.lock
Gogo.sum
RustCargo.lock
Javapom.xml, gradle.lockfile
.NETpackages.lock.json
RubyGemfile.lock
PHPcomposer.lock

Source Transparency

This detail page is rendered from real SKILL.md content. Trust labels are metadata-based hints, not a safety guarantee.

Related Skills

Related by shared tags or category signals.

Security

network-scan-nmap

No summary provided by upstream source.

Repository SourceNeeds Review
Security

malware-scan-yara

No summary provided by upstream source.

Repository SourceNeeds Review
Security

mobile-security-mobsf

No summary provided by upstream source.

Repository SourceNeeds Review
Security

dast-nuclei

No summary provided by upstream source.

Repository SourceNeeds Review