/packages
Comprehensively manage project dependencies with automated dashboards, security audits, safe updates, and vulnerability management across all major package managers.
Quick Start
/agileflow:packages ACTION=dashboardPurpose
This command provides complete dependency management by:
- Detecting project dependencies across npm, pip, cargo, and other package managers
- Generating comprehensive dependency dashboards with status and vulnerability info
- Running security audits and identifying CVEs
- Planning and applying safe dependency updates
- Creating stories for security issues
- Tracking and reporting on maintenance health
Parameters
| Parameter | Required | Default | Description |
|---|---|---|---|
ACTION | No | dashboard | dashboard, update, or audit |
SCOPE | No | all | For updates: security, major, minor, patch, all |
OUTPUT | No | markdown | For dashboard: markdown, html, json, csv |
INCLUDE_DEV | No | yes | Include dev dependencies: yes or no |
SAVE_TO | No | varies | Save report location (e.g., docs/08-project/deps.md) |
AUTO_PR | No | no | Auto-create PR for updates: yes or no |
Examples
View Dependency Dashboard
/agileflow:packagesShows comprehensive dashboard of all dependencies with status, vulnerabilities, and recommendations.
Export Dashboard as HTML
/agileflow:packages ACTION=dashboard OUTPUT=htmlGenerates interactive HTML dashboard with sortable tables and graphs.
Security Audit Only
/agileflow:packages ACTION=auditRuns security checks and reports vulnerabilities without making changes.
Update Security Vulnerabilities
/agileflow:packages ACTION=update SCOPE=securitySafely updates packages with known security issues and asks for confirmation.
Update Minor Versions
/agileflow:packages ACTION=update SCOPE=minorUpdates minor versions (new features, backwards compatible).
Auto-Create PR for Updates
/agileflow:packages ACTION=update SCOPE=all AUTO_PR=yesUpdates all packages and creates a pull request automatically.
Actions
ACTION=dashboard (Default)
Generates comprehensive dependency report showing:
- Total count - Production and development dependencies
- Vulnerability status - Critical, high, medium, low
- Update availability - Major, minor, patch versions
- License info - For compliance tracking
- Health score - Overall dependency maintenance health
Output Example:
# Dependencies Dashboard
Project: my-app
Generated: 2025-12-24 10:00:00 UTC
Total Dependencies: 145 (prod: 98, dev: 47)
## Summary
| Category | Count | Action Needed |
|----------|-------|---------------|
| Critical Vulnerabilities | 2 | Update immediately |
| Major Updates | 12 | Review breaking changes |
| Minor Updates | 28 | Safe to update |
| Up-to-date | 85 | No action |
| Deprecated | 3 | Find alternatives |
## Critical Vulnerabilities
### express@4.16.0
Current: 4.16.0 → Latest: 4.18.2 (+2 major)
Severity: HIGH (CVSS 7.5)
CVE: CVE-2022-24999
Description: ReDoS vulnerability in Express.js routing
Fix: npm install express@4.18.2
[Additional vulnerability details...]
## Maintenance Score: 78/100
Breakdown:
- Security: 60/100 (2 critical vulnerabilities)
- Freshness: 80/100 (most deps recent)
- License compliance: 95/100 (2 GPL warnings)
- Bundle size: 75/100 (some optimization possible)ACTION=update
Plans and applies dependency updates with safety checks:
- Detects outdated packages using appropriate package manager
- Categorizes by type - security, major, minor, patch
- Shows update plan with breaking change warnings
- Asks for confirmation before applying
- Runs tests after updates (if available)
- Creates PR if requested
- Generates report with all changes
Supported Package Managers:
- Node.js: npm, yarn, pnpm
- Python: pip, pip-tools, poetry
- Ruby: bundler (Gemfile)
- Go: go mod
- Rust: cargo
- Java: Maven, Gradle
- .NET: NuGet
Security Updates are always prioritized and recommended immediately.
Major Updates create individual stories for review (may require code changes).
Minor/Patch Updates can be batched safely.
ACTION=audit
Runs security audit only without updating:
Shows all known vulnerabilities with:
- Severity levels (critical, high, moderate, low)
- CVE identifiers and descriptions
- Affected package versions
- Recommended fixes
Example:
# Security Audit Report
Generated: 2025-12-24 10:00:00 UTC
Package Manager: npm
## Critical (2)
- express@4.16.0: CVE-2022-24999 (CVSS 7.5)
- lodash@4.17.19: CVE-2021-23337 (CVSS 7.4)
## High (0)
None
## Moderate (3)
[Details...]
Recommendation: Run /agileflow:packages ACTION=update SCOPE=securityPackage Manager Detection
The command automatically detects and supports:
| Manager | Files | Detection |
|---|---|---|
| npm | package.json, package-lock.json | Node.js projects |
| yarn | yarn.lock | Modern Node.js |
| pnpm | pnpm-lock.yaml | Modern Node.js |
| pip | requirements.txt, pyproject.toml | Python |
| poetry | poetry.lock | Modern Python |
| bundler | Gemfile, Gemfile.lock | Ruby/Rails |
| go mod | go.mod, go.sum | Go |
| cargo | Cargo.toml, Cargo.lock | Rust |
| Maven | pom.xml | Java |
| Gradle | build.gradle | Java |
| NuGet | *.csproj, packages.config | .NET |
Output Formats
Markdown (Default)
Human-readable report with tables, suitable for documentation:
/agileflow:packages ACTION=dashboard OUTPUT=markdownHTML
Interactive dashboard with filtering, sorting, and visualization:
/agileflow:packages ACTION=dashboard OUTPUT=htmlJSON
Structured data for tooling and integration:
/agileflow:packages ACTION=dashboard OUTPUT=jsonCSV
Spreadsheet-compatible format:
/agileflow:packages ACTION=dashboard OUTPUT=csvWorkflow Examples
Weekly Dependency Audit
# Run every Monday
/agileflow:packages ACTION=auditReview all vulnerabilities and plan updates.
Monthly Maintenance
# Update minor and patch versions
/agileflow:packages ACTION=update SCOPE=minorStay current with non-breaking changes.
Quarterly Major Updates
# Review major version upgrades
/agileflow:packages ACTION=update SCOPE=majorPlan and test breaking changes carefully.
Emergency Security Patch
# Immediately update critical vulnerabilities
/agileflow:packages ACTION=update SCOPE=securityCreate PR and deploy quickly if tests pass.
CI Integration
Automated Audit in CI
Add to GitHub Actions:
- name: Dependency audit
run: npm audit --audit-level=high
- name: Check outdated
run: npm outdated || true # Don't fail, just reportDependabot Configuration
Create .github/dependabot.yml:
version: 2
updates:
- package-ecosystem: "npm"
directory: "/"
schedule:
interval: "weekly"
open-pull-requests-limit: 10
- package-ecosystem: "pip"
directory: "/"
schedule:
interval: "weekly"Dependabot will automatically create PRs for updates.
Weekly Dependency Check
Add scheduled workflow:
name: Dependencies
on:
schedule:
- cron: '0 9 * * 1' # Monday 9am
jobs:
check:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- run: /agileflow:packages ACTION=dashboardCreating Stories for Vulnerabilities
When security issues are found, create stories:
Format:
US-XXXX: Fix security vulnerability in [PACKAGE]
Severity: [CRITICAL|HIGH|MEDIUM]
CVE: [CVE-XXXX-XXXXX]
Current: [version]
Fix: [recommended version]
Steps to Fix:
1. Update package: npm install package@latest
2. Run tests: npm test
3. Review changelog for breaking changesBest Practices
-
Prioritize Security - Always update critical vulnerabilities immediately
-
Batch Minor Updates - Group non-breaking updates for efficiency
-
Test After Updates - Always run full test suite after updates
-
Review Major Changes - Test major versions in staging before production
-
Monitor Deprecations - Act on deprecated packages early
-
License Compliance - Check licenses for corporate requirements
-
Bundle Size - Monitor bundle size impact of dependencies
-
Automated Audits - Run audits weekly, not just during releases
Rules
- Never auto-update critical packages without approval
- Always preview changes before applying (diff-first, YES/NO)
- Group minor/patch updates when possible
- Warn prominently about breaking changes
- Link to changelogs and migration guides
- Create stories for major upgrades
- Never skip tests after updating
- Always commit lock files (package-lock.json, Cargo.lock, etc.)
Related Commands
/setup-tests- Configure automated testing/ci-setup- Set up CI checks/setup-deployment- Configure deployment
On This Page
/packagesQuick StartPurposeParametersExamplesView Dependency DashboardExport Dashboard as HTMLSecurity Audit OnlyUpdate Security VulnerabilitiesUpdate Minor VersionsAuto-Create PR for UpdatesActionsACTION=dashboard (Default)ACTION=updateACTION=auditPackage Manager DetectionOutput FormatsMarkdown (Default)HTMLJSONCSVWorkflow ExamplesWeekly Dependency AuditMonthly MaintenanceQuarterly Major UpdatesEmergency Security PatchCI IntegrationAutomated Audit in CIDependabot ConfigurationWeekly Dependency CheckCreating Stories for VulnerabilitiesBest PracticesRulesRelated Commands