agent security skill risk: medium
Supply Chain Dependency Risk Auditor
Activates on the phrase "audit this project's dependencies" and evaluates all project dependencies against risk criteria including single maintainer, unmaintained status, low popul…
- Policy sensitive
- Human review
- External action: medium
SKILL 1 file
SKILL.md
--- name: antigravity-awesome-skills-supply-chain-risk-auditor-4cf8274d description: "Identifies dependencies at heightened risk of exploitation or takeover. Use when assessing supply chain attack surface, evaluating dependency health, or scoping security engagements." --- # Supply Chain Risk Auditor Activates when the user says "audit this project's dependencies". ## When to Use - Assessing dependency risk before a security audit - Evaluating supply chain attack surface of a project - Identifying unmaintained or risky dependencies - Pre-engagement scoping for supply chain concerns ## When NOT to Use - Active vulnerability scanning (use dedicated tools like npm audit, pip-audit) - Runtime dependency analysis - License compliance auditing ## Purpose You systematically evaluate all dependencies of a project to identify red flags that indicate a high risk of exploitation or takeover. You generate a summary report noting these issues. ### Risk Criteria A dependency is considered high-risk if it features any of the following risk factors: * **Single maintainer or team of individuals** - The project is primarily or solely maintained by a single individual, or a small number of individuals. The project is not managed by an organization such as the Linux Foundation or a company such as Microsoft. If the individual is an extremely prolific and well-known contributor to the ecosystem, such as `sindresorhus` or Drew Devault, the risk is lessened but not eliminated. Conversely, if the individual is anonymous — that is, their GitHub identity is not readily tied to a real-world identity — the risk is significantly greater. **Justification:** If a developer is bribed or phished, they could unilaterally push malicious code. Consider the left-pad incident. * **Unmaintained** - The project is stale (no updates for a long period of time) or explicitly deprecated/archived. The maintainer may have put a note in the README.md or a GitHub issue that the project is inactive, understaffed, or seeking new maintainers. The project's GitHub repository may have a large number of issues noting bugs or security issues that the maintainers have not responded to. Feature request issues do NOT count. **Justification:** If vulnerabilities are identified in the project, they may not be patched in a timely manner. * **Low popularity:** The project has a relatively low number of GitHub stars and/or downloads compared to other dependencies used by the target. **Justification:** Fewer users means fewer eyes on the project. If malicious code is introduced, it will not be noticed in a timely manner. * **High-risk features:** The project implements features that by their nature are especially prone to exploitation, including FFI, deserialization, or third-party code execution. **Justification:** These dependencies are key to the target's security posture, and need to meet a high bar of scrutiny. * **Presence of past CVEs:** The project has high or critical severity CVEs, especially a large number relative to its popularity and complexity. **Justification:** This is not necessarily an indicator of concern for extremely popular projects that are simply subject to more scrutiny and thus are the subject of more security research. * **Absence of a security contact:** The project has no security contact listed in `.github/SECURITY.md`, `CONTRIBUTING.md`, `README.md`, etc., or separately on the project's website (if one exists). **Justification:** Individuals who discover a vulnerability will have difficulty reporting it in a safe and timely manner. ## Prerequisites Ensure that the `gh` tool is available before continuing. Ask the user to install if it is not found. ## Workflow (Initial Setup) You achieve your purpose by: 1. Creating a `.supply-chain-risk-auditor` directory for your workspace * Start a `results.md` report file based on `results-template.md` in this directory 2. Finding all git repositories for direct dependencies. 3. Normalizing the git repository entries to URLs, i.e., if they are just in name/project format, make sure to prepend the github URL. ## Workflow (Dependency Audit) 1. For each dependency whose repository you identified in Initial Setup, evaluate its risk according to the Risk Criteria noted above. * For any criteria that require actions such as counting open GitHub issues, use the `gh` tool to query the exact data. It is vitally important that any numbers you cite (such as number of stars, open issues, and so on) are accurate. You may round numbers of issues and stars using ~ notation, e.g. "~4000 stars". 2. If a dependency satisfies any of the Risk Criteria noted above, add it to the High-Risk Dependencies table in `results.md`, clearly noting your reason for flagging it as high-risk. For conciseness, skip low-risk dependencies; only note dependencies with at least one risk factor. Do not note "opposites" of risk factors like having a column for "organization backed (lower risk)" dependencies. The absence of a dependency from the report should be the indicator that it is low- or no-risk. ## Workflow (Post-Audit) 1. For each dependency in the High-Risk Dependencies table, fill out the Suggested Alternative field with an alternative dependency that performs the same or similar function but is more popular, better maintained, and so on. Prefer direct successors and drop-in replacements if available. Provide a short justification of your suggestion. 2. Note the total counts for each risk factor category in the Counts by Risk Factor table, and summarize the overall security posture in the Executive Summary section. 3. Summarize your recommendations under the Recommendations section **NOTE:** Do not add sections beyond those noted in `results-template.md`. ## Limitations - Use this skill only when the task clearly matches the scope described above. - Do not treat the output as a substitute for environment-specific validation, testing, or expert review. - Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
REQUIRED CONTEXT
- list of project dependencies
- access to gh CLI tool
TOOLS REQUIRED
- gh
ROLES & RULES
Role assignments
- You systematically evaluate all dependencies of a project to identify red flags that indicate a high risk of exploitation or takeover. You generate a summary report noting these issues.
- Ensure that the `gh` tool is available before continuing. Ask the user to install if it is not found.
- For any criteria that require actions such as counting open GitHub issues, use the `gh` tool to query the exact data.
- It is vitally important that any numbers you cite (such as number of stars, open issues, and so on) are accurate. You may round numbers of issues and stars using ~ notation, e.g. "~4000 stars".
- If a dependency satisfies any of the Risk Criteria noted above, add it to the High-Risk Dependencies table in `results.md`, clearly noting your reason for flagging it as high-risk.
- For conciseness, skip low-risk dependencies; only note dependencies with at least one risk factor.
- Do not note "opposites" of risk factors like having a column for "organization backed (lower risk)" dependencies.
- For each dependency in the High-Risk Dependencies table, fill out the Suggested Alternative field with an alternative dependency that performs the same or similar function but is more popular, better maintained, and so on.
- Note the total counts for each risk factor category in the Counts by Risk Factor table, and summarize the overall security posture in the Executive Summary section.
- Summarize your recommendations under the Recommendations section.
- Do not add sections beyond those noted in `results-template.md`.
- Use this skill only when the task clearly matches the scope described above.
- Do not treat the output as a substitute for environment-specific validation, testing, or expert review.
- Stop and ask for clarification if required inputs, permissions, safety boundaries, or success criteria are missing.
EXPECTED OUTPUT
- Format
- markdown
- Schema
- markdown_sections · High-Risk Dependencies table, Suggested Alternative field, Counts by Risk Factor table, Executive Summary section, Recommendations section
- Constraints
- follow results-template.md structure exactly
- only include high-risk dependencies
- use accurate gh tool data
- round numbers with ~ notation
SUCCESS CRITERIA
- Create a `.supply-chain-risk-auditor` directory and start a `results.md` report file based on `results-template.md`.
- Find all git repositories for direct dependencies and normalize them to GitHub URLs.
- Evaluate each dependency against the six Risk Criteria using accurate `gh` tool data.
- Add only high-risk dependencies to the report table with clear justification.
- Provide Suggested Alternatives and justifications for flagged dependencies.
- Populate Counts by Risk Factor table and Executive Summary.
- Summarize recommendations in the Recommendations section.
FAILURE MODES
- May add sections beyond those in `results-template.md`.
- May cite inaccurate numbers instead of using the `gh` tool.
- May include low-risk dependencies or opposites of risk factors.
- May skip the prerequisite check for the `gh` tool.
CAVEATS
- Dependencies
- `gh` tool
- results-template.md
- Missing context
- Content or schema of results-template.md
- Target project or dependency list to audit
- Ambiguities
- References `results-template.md` without providing its content or structure.
- Does not specify how to handle non-GitHub repositories or non-JavaScript ecosystems.
QUALITY
- OVERALL
- 0.85
- CLARITY
- 0.88
- SPECIFICITY
- 0.92
- REUSABILITY
- 0.78
- COMPLETENESS
- 0.82
IMPROVEMENT SUGGESTIONS
- Inline a minimal results-template.md structure so the prompt is self-contained.
- Add explicit instructions for handling private repositories or non-GitHub hosting.
USAGE
Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.
MORE FOR AGENT
- MoltPass Client for AI Agent Identitiesagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Bluebook Policy Builderagentsecurity
- Security Blue Book Policy Builderagentsecurity
- Threat Modeling Security Architecture Expertagentsecurity
- Supply Chain Dependency Risk Auditoragentsecurity
- Threat Modeling Security Expertagentsecurity
- SIEM Detection Rule Tuning Guideagentsecurity
- AI File Metadata Compliance Auditoragentsecurity
- Azure Storage Misconfiguration Audit Reporteragentsecurity
- Implementing PAM for Database Accessagentsecurity
- AFL++ Coverage-Guided Fuzzing Procedureagentsecurity
- Supply Chain Attack Simulation Detectoragentsecurity
- Security Audit Fix Verifieragentsecurity
- Active Directory ACL Abuse Analyzeragentsecurity
- Privileged Access Workstation Implementation Guideagentsecurity
- SSRF Vulnerability Testing and Reporting Guideagentsecurity
- Security Audit Fix Revieweragentsecurity
- AWS IAM Privilege Escalation Detectoragentsecurity
- SSL/TLS Security Assessment with Sslyzeagentsecurity
- GCP Penetration Testing with GCPBucketBruteagentsecurity
- AWS CloudTrail Anomaly Detection Guideagentsecurity
- Security Audit Fix Commit Revieweragentsecurity