Dependency Vulnerability Scanner
Paste your dependency file and get an instant vulnerability report with severity ratings, CVSS scores, and fix recommendations. Powered by the OSV.dev vulnerability database.
Severity Breakdown
How It Works
Supported File Types
package.json
Node.js/npm – parses dependencies, devDependencies, and handles ^, ~, >= version ranges
requirements.txt
Python/PyPI – parses pinned (==) and constrained (>=, ~=) versions, skips comments and flags
go.mod
Go modules – parses require blocks and single require statements with semantic versions
Gemfile / Gemfile.lock
Ruby/RubyGems – parses gem declarations with version constraints and lockfile specs
Cargo.toml
Rust/crates.io – parses [dependencies] section with inline and table version formats
pom.xml
Java/Maven – parses dependency blocks with groupId:artifactId format
composer.json
PHP/Packagist – parses require and require-dev objects with Composer version constraints
FAQ
Is my dependency file sent to your servers?
No. All parsing happens in your browser using JavaScript. The only external call is to the OSV.dev public API to look up known vulnerabilities. Your code and file contents never touch our servers.
What vulnerability database does this use?
We use OSV.dev (Open Source Vulnerabilities), maintained by Google. It aggregates data from the GitHub Advisory Database, PyPI Advisory Database, RustSec, Go Vulnerability Database, and more. It covers npm, PyPI, Go, RubyGems, crates.io, Maven, and Packagist ecosystems.
How accurate are the CVSS scores?
CVSS scores come directly from the vulnerability advisories in OSV.dev. When a CVSS score is not available in the advisory, we display the severity level (Critical/High/Medium/Low) based on the advisory’s own severity classification. Some advisories may not include a CVSS score.
Can I scan packages without pinned versions?
We need a version to check against. If your file uses unpinned ranges (like “latest” or “*”), we’ll skip those packages since we can’t determine the exact version you’re running. For the most accurate scan, use a lockfile (package-lock.json, Gemfile.lock, etc.) or pin your versions.
What does “fix version” mean?
The fix version is the earliest version of the package where the vulnerability has been patched, as reported by the advisory. Upgrading to this version (or later) should resolve the specific vulnerability. Some vulnerabilities may not have a fix available yet.
Can I use this in CI/CD?
This is a browser-based tool. For CI/CD integration, check out osv-scanner, Google’s official CLI tool that uses the same OSV.dev database.
Go deeper with your stack health
Vulnerability scanning is just the start. Check EOL status, generate health badges, and plan your next upgrade with our full suite of free developer tools.