Skip to main content

Developer Kit

Dependency CVE Auditor

Audits project dependencies against NVD and GitHub Advisory Database, producing a CVE report ranked by CVSS score with patch guidance. Useful for catching known vulnerabilities before they reach production. Backend and full-stack engineers responsible for their own dependency health, security engineers preparing for SOC 2 or enterprise vendor reviews, and indie builders who cannot staff a dedicated AppSec role. from npm supply-chain incidents to Python package typosquatting to the widespread Log4Shell fallout. New advisories land weekly. Manually auditing dependencies is tedious and inconsistent, and tools like `npm audit` or `pip-audit` produce raw output that is hard to triage without context. Teams miss upgrades because the prioritization story is flat: a medium CVE in a critical package often matters more than a critical CVE in a dev dependency, but raw audit output does not communicate that.

Nexus CertifiedClaude CodeCodexOpenClaw
securitycvedependenciesvulnerabilitiessupply-chain

One-Time Purchase

$19.99

Sample Output

Dependency CVE Audit — package.json (Node 20)

Audited: 2025-06-11 · Manifest: package.json · Lockfile: package-lock.json (v3)


Audit Summary

| Metric | Count | |---|---| | Total packages scanned | 214 | | Direct dependencies | 38 | | Transitive dependencies | 176 | | Critical CVEs | 3 | | High CVEs | 7 | | Medium CVEs | 11 | | Low CVEs | 4 | | CISA KEV flagged | 2 | | Production-affecting | 19 | | Dev-only | 6 | | CVEs with no patch available | 2 |


Per-CVE Findings

🔴 CRITICAL


CVE-2024-21538 · NVD · GHSA-3xgq-45jj-v275

  • CVSS v3: 9.8 — Critical
  • Package: cross-spawn · Affected: < 7.0.5 · Installed: 7.0.3 · Fixed: 7.0.5
  • Classification: Transitive · Path: jest-clijest-runnercross-spawn
  • Environment: Dev-only
  • KEV Flag: No
  • Vulnerability: ReDoS via crafted shell argument string; denial-of-service in long-running CI processes
  • Upgrade Path: cross-spawn is not a direct dependency. Override in package.json:
    "overrides": { "cross-spawn": "^7.0.5" }
    
    Then run npm install. Verify with npm ls cross-spawn.
  • Breaking Changes: None documented between 7.0.3 → 7.0.5 (patch release).

CVE-2025-29927 · NVD · GHSA-f82v-jwr5-mffw

  • CVSS v3: 9.1 — Critical
  • Package: next · Affected: < 14.2.25 || >=15.0.0 < 15.2.3 · Installed: 14.2.10 · Fixed: 14.2.25
  • Classification: Direct · Production
  • KEV Flag: ⚠️ CISA KEV — actively exploited in the wild
  • Vulnerability: Middleware authorization bypass via x-middleware-subrequest header manipulation; unauthenticated access to protected routes
  • Upgrade Path: npm install next@14.2.25
  • Breaking Changes: No API-level breaking changes in this patch range; review custom middleware logic as an internal header-handling fix may affect edge cases with deeply nested subrequests.

CVE-2024-45813 · NVD · GHSA-952p-6rrq-rcjv

  • CVSS v3: 9.0 — Critical
  • Package: find-my-way · Affected: < 8.2.2 · Installed: 8.1.0 · Fixed: 8.2.2
  • Classification: Transitive · Path: fastifyfind-my-way
  • Environment: Production
  • KEV Flag: ⚠️ CISA KEV — actively exploited in the wild
  • Vulnerability: Route parameter regex allows catastrophic backtracking; remote DoS via crafted URL path
  • Upgrade Path: find-my-way is not directly installable in isolation from this path. Update fastify to ^4.28.1, which pulls find-my-way@8.2.2:
    npm install fastify@4.28.1
    
    Alternatively, add an override: "overrides": { "find-my-way": "^8.2.2" } and validate no route registration regressions.
  • Breaking Changes: fastify 4.27 → 4.28 includes one deprecation of reply.sent in favor of reply.headerSent; not a removal, but emit a deprecation warning in tests.

🟠 HIGH


CVE-2024-55565 · NVD · GHSA-mwcw-c2x4-8c55

  • CVSS v3: 7.5 — High
  • Package: nanoid · Affected: < 3.3.8 · Installed: 3.3.6 · Fixed: 3.3.8
  • Classification: Transitive · Path: vitepostcssnanoid
  • Environment: Dev-only
  • KEV Flag: No
  • Vulnerability: Predictable ID generation in certain character-set configurations; reduces entropy below acceptable thresholds
  • Upgrade Path: Add override: "overrides": { "nanoid": "^3.3.8" } and run npm install.
  • Breaking Changes: None documented (patch release).

CVE-2025-27789 · NVD · GHSA-v6h2-p8h4-qcjw

  • CVSS v3: 7.3 — High
  • Package: axios · Affected: < 1.7.9 · Installed: 1.6.8 · Fixed: 1.7.9
  • Classification: Direct · Production
  • KEV Flag: No
  • Vulnerability: SSRF via malformed URL with embedded credentials; attacker-controlled request targets internal network endpoints
  • Upgrade Path: npm install axios@1.7.9
  • Breaking Changes: axios 1.6 → 1.7 deprecates the data shorthand on GET requests. Audit usages of axios.get(url, { data: ... }) — these will log a deprecation warning but still function.

(5 additional High CVEs in full report — truncated in sample view)


Prioritized Upgrade Queue

| Priority | Package | Fix | Reason | |---|---|---|---| | 1 | next@14.2.25 | Direct · npm install | CISA KEV · CVSS 9.1 · auth bypass in production | | 2 | fastify@4.28.1 | Direct · resolves transitive | CISA KEV · CVSS 9.0 · remote DoS in production | | 3 | axios@1.7.9 | Direct · npm install | CVSS 7.3 · SSRF · production | | 4 | cross-spawn override ^7.0.5 | Transitive override | CVSS 9.8 · dev-only · low runtime risk, high CVSS | | 5 | nanoid override ^3.3.8 | Transitive override | CVSS 7.5 · dev-only |


Ready-to-Submit PR Body

## chore(deps): patch critical and high CVEs — security audit 2025-06-11

### Changes
- `next` 14.2.10 → **14.2.25** (CVE-2025-29927, CVSS 9.1, CISA KEV — middleware auth bypass)
- `fastify` 4.27.0 → **4.28.1** (CVE-2024-45813, CVSS 9.0, CISA KEV — route regex DoS via transitive `find-my-way`)
- `axios` 1.6.8 → **1.7.9** (CVE-2025-27789, CVSS 7.3 — SSRF via malformed URL)
- Added `overrides.cross-spawn ^7.0.5` (CVE-2024-21538, CVSS 9.8 — ReDoS in CI only)
- Added `overrides.nanoid ^3.3.8` (CVE-2024-55565, CVSS 7.5 — entropy reduction in dev tooling)

### Testing
- [ ] `npm run test:unit` green
- [ ] `npm run test:e2e` green against staging
- [ ] Confirm `npm ls find-my-way` resolves `8.2.2`
- [ ] Confirm `npm ls cross-spawn` resolves `7.0.5`
- [ ] Review any `reply.sent` deprecation warnings in fastify test output

### Notes
- `axios` 1.7 deprecates `GET` with `data` payload — no removal, monitor deprecation warnings
- Advisory presence does not confirm active exploitation in this codebase — CISA KEV flags indicate known in-the-wild exploitation generally
- `next` middleware edge-case review recommended for subrequest-heavy auth flows

Refs: CVE-2025-29927, CVE-2024-45813, CVE-2025-27789, CVE-2024-21538, CVE-2024-55565

No-Fix Queue — Monitor & Mitigate

CVE-2024-52798 · NVD · GHSA-rhx6-c78j-4q9w

  • CVSS v3: 5.3 — Medium
  • Package: path-to-regexp · Affected: 0.1.x (all) · Installed: 0.1.10 · Fixed: None — no patch available for the 0.1.x line
  • Status: No-fix · Monitor
  • Classification: Transitive · Path: expresspath-to-regexp
  • Vulnerability: ReDoS via backtracking on certain named parameter patterns
  • Mitigation: (1) Validate and sanitize all incoming route strings at the application boundary before passing to Express handlers. (2) Monitor for path-to-regexp 0.2.x or an Express patch release that upgrades this dependency. (3) Consider rate-limiting on route-heavy endpoints as a defense-in-depth measure. Do not force-override to path-to-regexp@6.x — that version has a completely different API and is incompatible with Express 4.x internals.

CVE-2025-30208 · NVD · GHSA-x574-m823-4x7w

  • CVSS v3: 4.3 — Medium
  • Package: vite · Affected: < 6.2.4 · Installed: 5.4.2 · Fixed: 6.2.4 (major version bump required)
  • Status: No direct patch on v5 line · Monitor
  • Classification: Direct · Dev-only
  • Vulnerability: Arbitrary file read via crafted /@fs/ URL; exploitable only if Vite dev server is exposed to untrusted networks
  • Mitigation: (1) Ensure Vite dev server is bound to localhost only (server.host: false in vite.config.ts) — this eliminates the attack surface for this CVE in typical usage. (2) Do not expose dev server ports externally in CI or staging environments. (3) Track Vite 5.x for a backport patch; a v6 upgrade is available but constitutes a major-version change with significant config and plugin API differences — evaluate separately outside this security patch cycle.

Full audit log and raw advisory JSON available as artifacts. Re-run recommended after any npm install that modifies the lockfile.

View full sample →

All sales final. No refunds on digital products.

Includes support for Claude Code, Codex, and OpenClaw in the same license.

What You Get With This Skill

Audits project dependencies against NVD and GitHub Advisory Database, producing a CVE report ranked by CVSS score with patch guidance. Useful for catching known vulnerabilities before they reach production.

All ClearPoint Nexus Skills Include

  • Production-ready workflow packaging for three supported platforms.
  • Reusable structure designed for repeatable operator tasks.
  • Clear deliverable format, not just raw prompt output.

Related Skills

Developer Kit
Featured
Code Generation
Generates, reviews, debugs, and executes code in sandboxed workflows. Useful for implementation, refactoring, and technical problem solving.
Claude CodeCodexOpenClaw
codingdebuggingcode-review

$19.99

One-time license

View Skill
Developer Kit
API Documentation Generator
Generates structured, developer-ready API documentation from code, OpenAPI specs, route definitions, or descriptions. Produces reference docs, quickstart guides, error references, and code examples.
Claude CodeCodexOpenClaw
apidocumentationdeveloper-experience

$19.99

One-time license

View Skill
Developer Kit
Intelligent PR Composer
Generates pull request descriptions that capture context, alternatives considered, test plan, risk areas, and reviewer guidance beyond a simple diff summary. Useful for teams that want senior-quality PRs without manual authoring.
Claude CodeCodexOpenClaw
pull-requestscode-reviewgit

$19.99

One-time license

View Skill