Node.js Security for AWS Lambda Functions AWS Lambda

Scan npm dependencies for CVEs in AWS Lambda Node.js functions. Prevent vulnerable packages from reaching production.

npm security for Lambda

Add CVE scanning to your Lambda deployment pipeline with SAM or CDK.

# In your SAM build pipeline (buildspec.yml):
phases:
  pre_build:
    commands:
      - npm audit --audit-level=high
  build:
    commands:
      - sam build
✓ Manual Scan

For a quick one-off scan before deployment, paste your package.json into PackageFix — no pipeline setup needed.

Scan your dependencies now — paste your manifest, get a fixed version back in seconds.

Open PackageFix →

No signup · No CLI · No GitHub connection · Runs 100% in your browser

Frequently Asked Questions

How do I add dependency scanning to AWS Lambda?
Add OSV Scanner or the ecosystem-specific audit tool to your AWS Lambda build configuration. The config snippet above works out of the box.
Does PackageFix integrate with CI/CD pipelines?
PackageFix is a browser tool for manual scans. For automated CI scanning, use OSV Scanner (Google) or pip-audit/npm audit in your pipeline. PackageFix generates the Renovate config and GitHub Actions workflow you can copy.
How do I fail a AWS Lambda build on critical CVEs?
Add --audit-level=critical to npm audit, or --fail-on=critical to pip-audit. The pipeline aborts if critical CVEs are found.
What is the OSV Scanner?
OSV Scanner is Google's open-source CLI tool that queries the same OSV database PackageFix uses. It's ideal for CI/CD integration.