by softaworks
管理多种语言的依赖项既耗时又容易出错。此技能可自动检测项目类型,在防止破坏性更改的同时应用安全更新,并运行安全审计。
1. 打开 Claude 聊天界面
2. 点击下方 "📋 复制" 按钮
3. 粘贴到 Claude 聊天框中并发送
4. 输入 "使用 dependency-updater 技能" 开始使用
=== dependency-updater 技能 === 作者: softaworks 描述: 管理多种语言的依赖项既耗时又容易出错。此技能可自动检测项目类型,在防止破坏性更改的同时应用安全更新,并运行安全审计。 使用方法: 1. 调用技能: "使用 dependency-updater 技能" 2. 提供相关信息: 根据技能要求提供必要参数 3. 查看结果: 技能会返回处理结果 示例: "使用 dependency-updater 技能,帮我分析一下这段代码"
这种方法适用于所有 Claude 用户,不需要安装额外工具。
productivity
low
Smart dependency management for any programming language with automatic detection and safe updates.
The Dependency Updater skill provides intelligent, language-agnostic dependency management that:
This skill eliminates the manual work of checking for outdated packages across different ecosystems while maintaining safety through semantic versioning awareness.
Use this skill when you want to:
| Scenario | Trigger Phrases |
|---|---|
| Update dependencies | "update dependencies", "update deps", "update my packages" |
| Check for outdated packages | "check for outdated packages", "what packages need updating" |
| Fix dependency problems | "fix my dependency problems", "resolve dependency conflicts" |
| Security audit | "audit dependencies for vulnerabilities", "check for security issues" |
| Diagnose issues | "diagnose dependency issues", "why won't my dependencies install" |
Quick Start:
update my dependencies
The skill will auto-detect your project type and handle everything.
| Language | Package File | Update Tool | Audit Tool |
|---|---|---|---|
| Node.js | package.json | taze | npm audit |
| Python | requirements.txt, pyproject.toml, Pipfile | pip-review | safety, pip-audit |
| Go | go.mod | go get -u | govulncheck |
| Rust | Cargo.toml | cargo update | cargo audit |
| Ruby | Gemfile | bundle update | bundle audit |
| Java | pom.xml, build.gradle | mvn versions:* | mvn dependency-check:check |
| .NET | *.csproj | dotnet outdated | dotnet list package --vulnerable |
The skill follows a systematic 7-step workflow:
1. DETECT PROJECT TYPE
Scan for package files and identify the package manager
2. CHECK PREREQUISITES
Verify required tools are installed, suggest installation if missing
3. SCAN FOR UPDATES
Run language-specific outdated checks and categorize updates
4. AUTO-APPLY SAFE UPDATES
Automatically apply MINOR and PATCH updates
5. PROMPT FOR MAJOR UPDATES
Ask user about each MAJOR update individually (breaking changes)
6. APPLY APPROVED MAJORS
Update only the packages the user approved
7. FINALIZE
Run install command and security audit
| Update Type | Version Change | Action |
|---|---|---|
| Fixed | No ^ or ~ prefix | Skip (intentionally pinned) |
| PATCH | 1.2.3 to 1.2.4 | Auto-apply |
| MINOR | 1.2.3 to 1.3.0 | Auto-apply |
| MAJOR | 1.2.3 to 2.0.0 | Prompt user individually |
The skill automatically identifies your project by scanning for common package files:
package.json - Node.js (npm/yarn/pnpm)requirements.txt / pyproject.toml / Pipfile - Pythongo.mod - GoCargo.toml - RustGemfile - Rubypom.xml / build.gradle - Java/Kotlin*.csproj - .NETBuilt-in security vulnerability scanning for each ecosystem:
Troubleshoots common issues:
update my dependencies
The skill will scan your project, apply safe updates, and prompt for major versions.
audit my dependencies for security issues
Runs security scanners and reports vulnerabilities by severity.
my npm install keeps failing, diagnose the issue
Analyzes dependency tree, identifies conflicts, and suggests fixes.
# Check prerequisites
scripts/check-tool.sh taze "npm install -g taze"
# Run taze directly
scripts/run-taze.sh
# Run in monorepo mode
scripts/run-taze.sh -r
Each language ecosystem requires its standard package manager:
For the best experience, install these optional but recommended tools:
| Language | Tool | Install Command |
|---|---|---|
| Node.js | taze | npm install -g taze |
| Python | pip-review | pip install pip-review |
| Python | pip-audit | pip install pip-audit |
| Go | govulncheck | go install golang.org/x/vuln/cmd/govulncheck@latest |
| Rust | cargo-audit | cargo install cargo-audit |
| Ruby | bundler-audit | gem install bundler-audit |
After running, you will see:
Vulnerabilities are reported with severity levels:
| Severity | Recommended Response |
|---|---|
| Critical | Fix immediately |
| High | Fix within 24 hours |
| Moderate | Fix within 1 week |
| Low | Fix in next release |
^ for active libraries, ~ for stable ones, exact for critical dependencies{
"dependencies": {
"critical-lib": "1.2.3", // Exact for critical dependencies
"stable-lib": "~1.2.3", // Patch only for stable libraries
"modern-lib": "^1.2.3" // Minor OK for actively maintained
}
}
When dependencies are completely broken:
rm -rf node_modules package-lock.json
npm cache clean --force
npm install
rm -rf venv
python -m venv venv
source venv/bin/activate
pip install -r requirements.txt
rm go.sum
go mod tidy
After running updates, verify:
| Tool | Language | Purpose | Link |
|---|---|---|---|
| taze | Node.js | Smart dependency updates | GitHub |
| npm-check-updates | Node.js | Alternative to taze | GitHub |
| pip-review | Python | Interactive pip updates | GitHub |
| cargo-edit | Rust | Cargo dependency management | GitHub |
| bundler-audit | Ruby | Security auditing | GitHub |
MIT
View Count
0
Download Count
0
Favorite Count
0
Quality Score
72