feat: Add Dependency Risk Analyzer template#121
feat: Add Dependency Risk Analyzer template#121AnsariUsaid wants to merge 1 commit intoLamatic:mainfrom
Conversation
Automated security analysis for npm and Python dependencies. Detects abandoned packages, CVEs, license risks, and bus factor. Features: - Multi-ecosystem support (npm + Python) - OSV.dev CVE database integration - Risk scoring algorithm (0-100 scale) - AI-generated markdown security reports - Free alternative to Snyk Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
|
Important Review skippedAuto reviews are limited based on label configuration. 🏷️ Required labels (at least one) (1)
Please check the settings in the CodeRabbit UI or the ⚙️ Run configurationConfiguration used: Repository UI (base), Organization UI (inherited) Review profile: ASSERTIVE Plan: Pro Run ID: You can disable this status message by setting the Use the checkbox below for a quick retry:
✨ Finishing Touches🧪 Generate unit tests (beta)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
PR Validation ResultsNew Contributions Detected
Check Results
🎉 All checks passed! This contribution follows the AgentKit structure. |
d-pamneja
left a comment
There was a problem hiding this comment.
Could you improve the schema for the input of the trigger node, so that the flow can run smoothly, else LGTM.
|
Hi @AnsariUsaid However, file_content is defined in the trigger schema as a "string", so for Node inputs we’re passing raw JSON text (e.g. "{"dependencies":{...}}") rather than an object. That means pkg.dependencies and pkg.devDependencies are undefined, packages becomes an empty array, and the npm branch never actually iterates over any dependencies. The Python branch doesn’t hit this problem because it explicitly treats the input as text and splits it line by line. I’d also align codeNode_170 with this approach so both code paths treat file_content consistently: parse JSON for npm-style inputs and treat plain text as requirements.txt for Python. This should stop the NodeJS flow from “skipping” and actually produce risk reports for Node dependencies. |
🔒 Dependency Risk Analyzer
Automated security analysis for npm and Python dependencies.
Problem Statement
Developers waste hours manually auditing dependencies for security risks. Existing tools are either:
Solution
A free, comprehensive dependency risk analyzer that provides instant security reports.
Features
Architecture
11-node flow with classifier logic, parallel ecosystem branches, loop-based package analysis, and LLM report generation.
Testing
Flow deployed and tested in Lamatic Studio with real package.json and requirements.txt files.
Submission for: Lamatic AgentKit Challenge
PR Checklist
1. Select Contribution Type
kits/<category>/<kit-name>/)bundles/<bundle-name>/)templates/<template-name>/)2. General Requirements
kebab-caseand matches the flow IDREADME.md(purpose, setup, usage)3. File Structure (Check what applies)
config.jsonpresent with valid metadata (name, description, tags, steps, author, env keys)flows/<flow-name>/(where applicable) include:config.json(Lamatic flow export)inputs.jsonmeta.jsonREADME.md.env.examplewith placeholder values only (kits only)config.jsonnode graphs (changes via Lamatic Studio export)4. Validation
npm install && npm run devworks locally (kits: UI runs; bundles/templates: flows are valid)