Dependency Scanning

SCA · DevSecOps
Definition

Dependency scanning (also called Software Composition Analysis or SCA) is the process of automatically checking every package your project uses against databases of known vulnerabilities. Given that a typical application has hundreds of dependencies, manual checking is impractical — dependency scanning tools automate this and flag packages with known CVEs.

What dependency scanning checks

Basic dependency scanning checks your package versions against CVE databases. More advanced tools also check for:

When to scan

The answer is: always. The three most useful integration points are:

How PackageFix fits in

PackageFix is a manual, browser-based dependency scanner — paste your manifest, get results immediately. It's complementary to automated tools like Dependabot (which opens PRs automatically) or OSV Scanner (which runs in CI). Use PackageFix when you need a quick one-off check, want to see the CISA KEV status, or need a downloadable fixed manifest rather than just a report.

Check your dependencies for CVEs, CISA KEV entries, and supply chain risks.

Open PackageFix →

Free · No signup · No CLI · Runs in your browser

Common questions

What's the difference between dependency scanning and SAST?
SAST (Static Application Security Testing) analyzes your own code for vulnerabilities — SQL injection, XSS, insecure cryptography. Dependency scanning checks the third-party packages you use. Both are important and complementary. SAST doesn't check dependencies; dependency scanning doesn't check your own code.
Is npm audit dependency scanning?
Yes — npm audit is a basic dependency scanner built into npm. It checks your packages against the npm security advisory database. More comprehensive tools like PackageFix add CISA KEV flags, supply chain detection, transitive scanning, and fix output.
How often should I run dependency scans?
Automated scanning should run on every pull request and every deployment. Manual scans with a tool like PackageFix are useful when evaluating a new dependency, after a security incident, or before a major release.
What should I do with scan results?
Fix Critical CVEs and CISA KEV entries immediately. Schedule High CVEs for your next sprint. Medium and Low CVEs can go in the backlog. Most importantly — don't just acknowledge and ignore. Unaddressed CVEs that later get exploited are a much worse outcome than the time it takes to update a package version.

Related guides