Dependency Audit Guide

CVE Severity Levels (CVSS v3)

SeverityCVSS ScoreAction
Critical9.0 โ€“ 10.0Patch immediately (same day)
High7.0 โ€“ 8.9Patch within 1 week
Medium4.0 โ€“ 6.9Patch within 1 month
Low0.1 โ€“ 3.9Patch in next release

npm / Node.js

# Run security audit
npm audit

# Auto-fix safe updates
npm audit fix

# Fix including breaking changes (test first!)
npm audit fix --force

# JSON output for CI integration
npm audit --json | jq '.vulnerabilities'

# Check specific package
npm audit --package-lock-only

Go / Python / Java

# Go: check for known vulnerable modules
go install golang.org/x/vuln/cmd/govulncheck@latest
govulncheck ./...

# Python: safety check
pip install safety
safety check --full-report

# Java: OWASP Dependency Check
mvn org.owasp:dependency-check-maven:check

# GitHub Dependabot (all languages)
# Add .github/dependabot.yml:
version: 2
updates:
  - package-ecosystem: "npm"
    directory: "/"
    schedule: { interval: "weekly" }

Snyk Integration

# Install Snyk CLI
npm install -g snyk

# Authenticate
snyk auth

# Test for vulnerabilities
snyk test

# Monitor continuously
snyk monitor

# Fix automatically
snyk fix

# CI/CD (fail build on high severity)
snyk test --severity-threshold=high

Dependency Audit Policy