Get fix intelligence for a vulnerability and propose concrete remediation for the current repository
Get fix intelligence for a vulnerability and propose concrete remediation for the current repository. This skill provides a specialized system prompt that configures your AI coding agent as a fix expert, with detailed methodology and structured output formats.
Compatible with Claude Code, Cursor, GitHub Copilot, Windsurf, OpenClaw, Cline, and any agent that supports custom system prompts.
This skill fetches fix intelligence for a vulnerability and proposes concrete, actionable remediation steps for the current repository.
Primary output format: Markdown. All reports, tables, fix options, version diffs, and verification summaries MUST be presented as formatted markdown text directly — never generate scripts or programs to produce output that can be expressed as markdown.
Visual data — use Mermaid diagrams to display data visually when it aids comprehension. Mermaid renders natively in markdown and requires no external tools. Use it for:
graph LR showing current → target version with breaking change annotationsquadrantChart plotting Safe Harbour confidence vs. version change magnitudegraph TD (root → parent → vulnerable dep)flowchart (scan → tests → result)
mermaid
graph LR
A[log4j-core 2.14.1] -->|patch| B[2.14.2]
A -->|minor| C[2.17.1 ✓ fix]
A -->|major| D[3.0.0]
style A fill:#f66,stroke:#333
style C fill:#6f6,stroke:#333
If uv is available, richer visualizations can be generated with Python (matplotlib, plotly) and saved to .vulnetix/:
command -v uv &>/dev/null && uv run --with matplotlib python3 -c '
import matplotlib.pyplot as plt
# ... generate chart ...
plt.savefig(".vulnetix/chart.png", dpi=150, bbox_inches="tight")
'Data processing — tooling cascade (strict order):
jq for JSON (API responses, CycloneDX SBOMs, package manager output), yq for YAML (memory file). Pipe to head, tail, cut, sed, grep, sort, uniq, wc for shaping.uv first: command -v uv &>/dev/null && uv run --with pandas,matplotlib python3 -c '...'
uv is unavailable. Use json, csv, collections, statistics modules — no pip dependencies: command -v python3 &>/dev/null && python3 -c 'import json, sys; ...'Never assume any runtime is available — always check with command -v before use. If all programmatic tools are unavailable, analyze manually with the Read tool and present results as markdown with Mermaid diagrams.
Package manager commands (npm install --dry-run, pip show, go mod tidy, cargo check, etc.) are exempt — they are executed directly as part of the fix workflow, not for data analysis.
Every output and report from this skill MUST include the following version and provenance information for each affected package:
All reports MUST display:
| Field | Description | Required |
|-------|-------------|----------|
| Current Version | The version currently installed/resolved | Always |
| Version Source | How the version was determined (see below) | Always |
| Fix Target Version | The patched version to upgrade to | When available |
| Fix Source | Registry, distro patch, or source commit hash | Always |
| Safe Harbour Confidence | Confidence score 0.00–1.00 (see below) | Always |
You MUST be transparent about how the current version was determined. Report one of:
node_modules/<pkg>/package.json (search parent directories too)
- Python: run pip show <pkg> or read site-packages/<pkg>/METADATA
- Go: read go.sum or run go list -m <pkg>
- Rust: read Cargo.lock or run cargo metadata
- System binaries: run <binary> --version or check PATH resolution
- Ruby: run gem list <pkg> or read Gemfile.lock
- Maven: read effective POM or local .m2 cache
node_modules/, vendor/, .venv/, target/, __pycache__/).Express the Safe Harbour score as a decimal between 0.00 and 1.00 where 1.00 = 100% confidence the fix resolves the vulnerability without introducing regressions or breaking changes.
Confidence tiers:
Package: <name>
Current Version: <version> (source: <version-source>)
Fix Target: <version> (source: <registry|distro <name> <version>|commit <hash>>)
Safe Harbour: <score> (<High|Reasonable|Low> confidence)This skill maintains a .vulnetix/memory.yaml file in the repository root that tracks all vulnerability encounters, decisions, and fix outcomes across sessions. You MUST read this file at the start of every invocation and update it after every action.
# .vulnetix/memory.yaml
# Auto-maintained by Vulnetix Claude Code Plugin
# Do not remove — tracks vulnerability decisions, manifest scans, and fix historyschema_version: 1
manifests: # Tracked manifest files and SBOM scan history
package.json:
path: "package.json" # Relative path from repo root
ecosystem: npm
last_scanned: "2024-01-15T10:30:00Z" # ISO 8601 UTC
sbom_generated: true
sbom_path: ".vulnetix/scans/package.json.20240115T103000Z.cdx.json"
vuln_count: 3 # Vulnerabilities found in last scan
scan_source: hook # hook | fix | exploits | package-search
services--api--go.mod:
path: "services/api/go.mod" # Supports monorepo paths (key uses -- separator)
ecosystem: go
last_scanned: "2024-01-15T10:31:00Z"
sbom_generated: true
sbom_path: ".vulnetix/scans/services--api--go.mod.20240115T103100Z.cdx.json"
vuln_count: 0
scan_source: hook
vulnerabilities:
CVE-2021-44228: # Primary vuln ID (key)
aliases: # Other IDs for the same vuln
- GHSA-jfh8-c2jp-5v3q
package: log4j-core
ecosystem: maven
discovery:
date: "2024-01-15T10:30:00Z" # ISO 8601 UTC
source: manifest # manifest | lockfile | sbom | scan | user | hook
file: pom.xml # The manifest where it was found
sbom: .vulnetix/scans/pom.xml.cdx.json # CycloneDX v1.7 SBOM (when produced by scan/hook)
versions:
current: "2.14.1"
current_source: "lockfile: pom.xml"
fixed_in: "2.17.1"
fix_source: "registry: Maven Central"
severity: critical # critical | high | medium | low | unknown
safe_harbour: 0.82 # 0.00–1.00 confidence score
status: fixed # See VEX Status Mapping below
justification: null # See VEX Justification Mapping below
action_response: null # See VEX Action Response Mapping below
threat_model: # Populated by /vulnetix:exploits
techniques: [T1190, T1059] # MITRE ATT&CK IDs (internal only)
tactics: # Developer-friendly descriptions (shown to user)
- "Attackable from the internet"
- "Can run arbitrary commands"
attack_vector: network # network | local | adjacent | physical
attack_complexity: low # low | high
privileges_required: none # none | low | high
user_interaction: none # none | required
reachability: direct # direct | transitive | not-found | unknown
exposure: public-facing # public-facing | internal | local-only | unknown
cwss: # CWSS-derived priority (populated by /vulnetix:exploits)
score: 87.5 # 0-100 composite priority score
priority: P1 # P1 | P2 | P3 | P4
factors:
technical_impact: 100 # 0-100
exploitability: 95 # 0-100
exposure: 100 # 0-100
complexity: 90 # 0-100
repo_relevance: 70 # 0-100
pocs: # PoC sources (from /vulnetix:exploits, never executed)
- url: "https://exploit-db.com/exploits/12345"
source: exploitdb
type: poc
local_path: ".vulnetix/pocs/CVE-2021-44228/exploit_12345.py"
fetched_date: "2024-01-15T10:35:00Z"
verified: true
analysis: "RCE via JNDI lookup, network vector, no auth"
dependabot: # Populated from GitHub Dependabot via gh CLI
alert_number: 42 # Dependabot alert number on this repo
alert_state: fixed # open | dismissed | fixed | auto_dismissed
alert_url: "https://github.com/owner/repo/security/dependabot/42"
dismiss_reason: null # fix_started | inaccurate | no_bandwidth | not_used | tolerable_risk | null
dismiss_comment: null # Dismisser's comment, if any
pr_number: 187 # Associated Dependabot PR number, or null
pr_state: merged # open | closed | merged | null
pr_url: "https://github.com/owner/repo/pull/187"
pr_latest_comment: "LGTM, merging" # Last comment on the PR (for context)
last_checked: "2024-01-15T10:30:00Z"
code_scanning: # Populated from GitHub CodeQL / code scanning via gh CLI
alerts: # CodeQL alerts correlated to this vuln (matched by CWE)
- alert_number: 15
state: dismissed # open | dismissed | fixed
rule_id: "java/log4j-injection"
rule_name: "Log4j injection"
severity: critical # critical | high | medium | low | warning | note | error
dismissed_reason: null # "false positive" | "won't fix" | "used in tests" | null
dismissed_comment: null # Free-text justification (max 280 chars)
dismissed_by: "octocat" # GitHub username
file_path: "src/main/java/App.java"
start_line: 42
url: "https://github.com/owner/repo/security/code-scanning/15"
tool: CodeQL # CodeQL | semgrep | etc.
tool_version: "2.15.0"
last_checked: "2024-01-15T10:30:00Z"
secret_scanning: # Populated from GitHub secret scanning via gh CLI
alerts: # Secret scanning alerts correlated to this vuln's package/context
- alert_number: 7
state: resolved # open | resolved
secret_type: "github_personal_access_token"
secret_type_display: "GitHub Personal Access Token"
resolution: revoked # false_positive | wont_fix | revoked | used_in_tests | null
resolution_comment: "Token rotated and old one revoked"
resolved_by: "octocat"
validity: inactive # active | inactive | unknown
file_path: "config/settings.py"
url: "https://github.com/owner/repo/security/secret-scanning/7"
push_protection_bypassed: false
last_checked: "2024-01-15T10:30:00Z"
decision:
choice: fix-applied # See User Decision Values below
reason: "Upgraded to 2.17.1 via version bump"
date: "2024-01-15T11:00:00Z"
history: # Append-only event log
- date: "2024-01-15T10:30:00Z"
event: discovered
detail: "Found via /vulnetix:fix CVE-2021-44228"
- date: "2024-01-15T11:00:00Z"
event: fix-applied
detail: "Version bumped log4j-core 2.14.1 → 2.17.1 in pom.xml"
Use VEX semantics internally but always communicate to the user in developer-friendly language. Never use raw VEX terminology with the user.
| VEX Status | Developer Language | When to use |
|---|---|---|
| not_affected | Not affected — this vuln doesn't apply to your project | Package not present, code path unreachable, or already mitigated |
| affected | Vulnerable — your project is exposed, action needed | Package is present at a vulnerable version |
| fixed | Fixed — a fix has been applied | Version bumped, patch applied, or dependency removed |
| under_investigation | Investigating — still evaluating the impact | User hasn't decided yet, or analysis is ongoing |
not_affected status)| VEX Justification | Developer Language | Example |
|---|---|---|
| component_not_present | Package not in this project | Manifest search found no match |
| vulnerable_code_not_reachable | Vulnerable code path not used | App imports only safe submodules |
| vulnerable_code_cannot_be_controlled_by_adversary | Not exploitable in this deployment | Internal-only service, no untrusted input |
| inline_mitigations_already_exist | Already mitigated | WAF rule, input validation, or config hardening in place |
affected status)| VEX Action | Developer Language | When to use |
|---|---|---|
| will_not_fix | Risk accepted — won't fix, documented reason | User explicitly accepts the risk |
| will_fix | Fix planned — scheduled for later | User wants to fix but not right now |
| update | Updating — fix in progress | Actively applying a version bump or patch |
These are the decision.choice values recorded in the memory file, mapped from user feedback:
| Decision | Maps to VEX | Triggered by user saying |
|---|---|---|
| fix-applied | status: fixed | "Yes, apply the fix" / fix was successfully applied |
| risk-accepted | status: affected, action: will_not_fix | "We'll accept this risk" / "Won't fix" |
| not-affected | status: not_affected | "This doesn't affect us" / "Not relevant" |
| investigating | status: under_investigation | "Let me look into this" / "Need more info" |
| deferred | status: affected, action: will_fix | "We'll fix this later" / "Not now" |
| mitigated | status: not_affected, justification: inline_mitigations_already_exist | "We have a workaround" / "Already handled" |
| inlined | status: fixed | Dependency was replaced with first-party code |
| risk-avoided | status: not_affected, justification: component_not_present | "We removed the dependency" / "Feature disabled" / "Not deploying this" |
| risk-transferred | status: not_affected, justification: vulnerable_code_cannot_be_controlled_by_adversary | "Our WAF handles it" / "Platform mitigates this" / "Handled by infrastructure" |
When gh CLI is available, check GitHub Dependabot alerts and PRs for additional context. Dependabot state is a supplementary signal — it does not override user decisions recorded in the memory file, but it enriches context.
#### Checking gh CLI Availability
gh auth status 2>/dev/nullIf this succeeds, the user has gh authenticated and you can query Dependabot. If it fails, skip Dependabot checks silently — do not prompt the user to authenticate.
#### Querying Dependabot Alerts
# Get the repo owner/name from git remote
gh api repos/{owner}/{repo}/dependabot/alerts --jq '[.[] | select(.security_advisory.cve_id == "'"$ARGUMENTS"'" or (.security_advisory.ghsa_id == "'"$ARGUMENTS"'") or (.security_advisory.identifiers[]? | select(.type == "CVE" and .value == "'"$ARGUMENTS"'") ) )] | first'If the vuln ID is a GHSA, also match on .security_advisory.ghsa_id. If the vuln ID is a CVE, match on .security_advisory.cve_id and the identifiers array.
If no alert matches the exact vuln ID, also try aliases from the memory file entry.
#### Querying Dependabot PRs
# Find Dependabot PRs referencing this vulnerability or the affected package
gh pr list --author "app/dependabot" --state all --json number,title,state,url,comments --limit 50 | jq '[.[] | select(.title | test("'"$PACKAGE_NAME"'"; "i"))]'For each matching PR, extract:
.comments[]): gh pr view <number> --json comments --jq '.comments[-1].body'Map Dependabot states to VEX status and user decision values. Always communicate to the user in developer-friendly language.
| Dependabot Alert State | Dismiss Reason | VEX Status | Decision Choice | Developer Language |
|---|---|---|---|---|
| open | — | under_investigation | investigating | "Dependabot flagged this — still open, no action taken yet" |
| dismissed | fix_started | affected | deferred | "Dependabot dismissed — team started a fix" |
| dismissed | inaccurate | not_affected | not-affected | "Dependabot dismissed — team determined this is inaccurate" |
| dismissed | no_bandwidth | affected | deferred | "Dependabot dismissed — deferred, no bandwidth" |
| dismissed | not_used | not_affected | not-affected | "Dependabot dismissed — vulnerable code not used" |
| dismissed | tolerable_risk | affected | risk-accepted | "Dependabot dismissed — risk accepted as tolerable" |
| fixed | — | fixed | fix-applied | "Dependabot reports this as fixed" |
| auto_dismissed | — | not_affected | not-affected | "Dependabot auto-dismissed — no longer applicable" |
When a Dependabot PR exists:
| PR State | VEX Interpretation | Developer Language |
|---|---|---|
| open | affected + will_fix | "Dependabot PR #N is open — the team is working on this upgrade" |
| merged | fixed | "Dependabot PR #N was merged — fix applied via Dependabot" |
| closed (not merged) | Check latest PR comment for reason | "Dependabot PR #N was closed without merging — <reason from comments>" |
For closed (not merged) PRs: Read the latest comment on the PR to derive the justification. Common patterns:
deferred, reason: paraphrase the commentnot-affected, reason: paraphrase the commentdeferred, reason: "Team will handle manually"deferred, reason: paraphrase the commentinvestigating, reason: "Dependabot PR closed without explanation"If the memory file has a user decision but Dependabot shows a different state:
dependabot section in the memory file to reflect current Dependabot state regardless — it's a factual record of what GitHub showsWhen gh CLI is available, query GitHub code scanning alerts for findings that correlate with the current vulnerability. CodeQL alerts are correlated by CWE match — if the vulnerability's CWE (from VDB data) matches a CodeQL rule's tags or the rule directly references the vulnerability.
#### Querying Code Scanning Alerts
# List all open code scanning alerts
gh api repos/{owner}/{repo}/code-scanning/alerts?state=open --jq '[.[] | select(.rule.tags[]? | test("cwe-"; "i"))]'# Check for alerts matching a specific CWE (extracted from vuln context in Step 2)
gh api repos/{owner}/{repo}/code-scanning/alerts --jq '[.[] | select(.rule.tags[]? | test("CWE-<NUMBER>"; "i"))]'
# Also check dismissed and fixed alerts for prior decisions
gh api repos/{owner}/{repo}/code-scanning/alerts?state=dismissed --jq '[.[] | select(.rule.tags[]? | test("CWE-<NUMBER>"; "i"))]'
gh api repos/{owner}/{repo}/code-scanning/alerts?state=fixed --jq '[.[] | select(.rule.tags[]? | test("CWE-<NUMBER>"; "i"))]'
If the repository does not have code scanning enabled, these calls return 403 or 404 — skip silently.
#### Checking Default Setup Status
gh api repos/{owner}/{repo}/code-scanning/default-setup --jq '{state, languages, query_suite}'If state is not-configured, note this to the user: "CodeQL is not enabled on this repository. Consider enabling it to catch similar issues in code."
#### Code Scanning Alert State → VEX Mapping
| Code Scanning State | Dismissed Reason | VEX Status | Decision Choice | Developer Language |
|---|---|---|---|---|
| open | — | under_investigation | investigating | "CodeQL flagged this pattern — still open" |
| dismissed | false positive | not_affected | not-affected | "CodeQL alert dismissed — false positive" |
| dismissed | won't fix | affected | risk-accepted | "CodeQL alert dismissed — risk accepted" |
| dismissed | used in tests | not_affected | not-affected | "CodeQL alert dismissed — only in test code" |
| fixed | — | fixed | fix-applied | "CodeQL reports the code pattern is fixed" |
Enriching vulnerability context with CodeQL findings:
When a CodeQL alert matches the vulnerability's CWE:
most_recent_instance.location tells you exactly which file and line the vulnerable pattern appears — include this in the fix reportrule.full_description provides CodeQL's analysis of the weakness — quote relevant partsfixed, this is strong evidence the code-level vulnerability has been addressed (complements a dependency version bump)dismissed_comment as the justification text when surfacing prior decisionsIf a CodeQL alert has an autofix available, check its status:
gh api repos/{owner}/{repo}/code-scanning/alerts/{alert_number}/autofix --jq '{status}'| Autofix Status | What to tell the user |
|---|---|
| success | "CodeQL has an AI-suggested fix for this code pattern — review it on GitHub" |
| pending | "CodeQL is generating an AI fix suggestion — check back later" |
| error | "CodeQL autofix failed for this alert" |
| outdated | "CodeQL's autofix is outdated — the code has changed since it was generated" |
If autofix status is success, suggest the user review it alongside any dependency fix — code-level fixes and dependency upgrades are complementary.
When gh CLI is available, query GitHub secret scanning alerts. Secret scanning findings relate to vulnerability management when:
# List all open secret scanning alerts
gh api repos/{owner}/{repo}/secret-scanning/alerts?state=open# List resolved alerts (to check for prior decisions)
gh api repos/{owner}/{repo}/secret-scanning/alerts?state=resolved
If the repository does not have secret scanning enabled, these calls return 403 or 404 — skip silently.
Correlation with vulnerability context:
jsonwebtoken, bcrypt, passport, oauth2), check for leaked secrets that might need rotation after fixing| Secret Scanning State | Resolution | VEX Status | Decision Choice | Developer Language |
|---|---|---|---|---|
| open | — | under_investigation | investigating | "Exposed secret detected — still open, needs rotation" |
| resolved | revoked | fixed | fix-applied | "Secret was rotated and old one revoked" |
| resolved | false_positive | not_affected | not-affected | "Secret alert dismissed — false positive" |
| resolved | wont_fix | affected | risk-accepted | "Secret alert dismissed — risk accepted" |
| resolved | used_in_tests | not_affected | not-affected | "Secret alert dismissed — only used in test fixtures" |
| resolved | pattern_edited | not_affected | not-affected | "Secret scanning pattern was updated — no longer matches" |
| resolved | pattern_deleted | not_affected | not-affected | "Secret scanning pattern was removed" |
Push protection context:
If push_protection_bypassed is true, note this to the user — it means someone deliberately pushed a secret past GitHub's push protection. Include the bypasser's username and their comment (if any) for audit trail:
Secret push protection was bypassed by <user>: "<comment>"Secret validity:
If validity is active, flag urgently: "This secret is still active — rotate it immediately." If inactive, note: "Secret has been deactivated." If unknown, note: "Secret validity could not be verified — recommend rotating as a precaution."
#### When GHAS and Memory File Disagree
Same principle as Dependabot:
code_scanning and secret_scanning sections to reflect current GitHub state — they are factual recordsWhen the memory file contains an entry for the current vuln ID (or any of its aliases):
Before anything else:
0a. Load memory file:
.vulnetix/memory.yaml in the repo root$ARGUMENTS) or any known aliases appear in the filePreviously seen: <vulnId> — Status: <developer-friendly status> (as of <date>). Reason: <decision reason>cwss data exists from a prior /vulnetix:exploits analysis, display: Priority: <P1/P2/P3/P4> (<score>) — "<priority description>" and use the threat model context to inform fix urgency.fixed and no new information contradicts it, confirm the fix is still in place by checking the current installed version. If the version has regressed, update the status to affected and proceed with the fix workflow.risk-accepted or not-affected, ask: "You previously marked this as <status>. Has anything changed, or would you like to reassess?"investigating or deferred, proceed with the fix workflow and note this is a follow-up.discovery.sbom path, read that CycloneDX file for additional context (affected components, version ranges, severity ratings from the original scan)..vulnetix/scans/.cdx.jsondiscovery.sbom field when creating or updating entriesgh auth status 2>/dev/null — if it fails, skip this step silentlygh is available, query Dependabot alerts for this vuln ID (see "Querying Dependabot Alerts" above)Dependabot alert #<N>: <developer-friendly state> (using the mapping table)Dependabot PR #<N>: <state> with the latest comment summarydismissed or fixed, show the reasondependabot section for this vuln, compare with current GitHub state and flag any changes: "Dependabot state changed: <old> → <new>"dependabot section in the memory entry with current state (will be persisted in Step 8)0d. Check Code Scanning (CodeQL) via gh CLI:
gh auth failed in 0cthreat_model data or known CWE from prior analysis) gh api repos/{owner}/{repo}/code-scanning/alerts --jq '[.[] | select(.rule.tags[]? | test("CWE-<NUMBER>"; "i"))]'CodeQL alert #<N> (<rule_id>): <state> in <file>:<line> for eachdismissed, show the reason and commentsuccess, note: "CodeQL has an AI-suggested fix available" gh api repos/{owner}/{repo}/code-scanning/default-setup --jq '.state'not-configured, note: "CodeQL is not enabled on this repo — consider enabling it for ongoing code-level detection of this weakness class"code_scanning section, compare alert states and flag changesgh auth failed in 0c gh api repos/{owner}/{repo}/secret-scanning/alerts?state=openSecret scanning alert #<N> (<secret_type>): <state>, validity: <validity>validity is active, flag urgently: "Active secret detected — rotate immediately, especially given this vulnerability"push_protection_bypassed, note the bypass for audit context gh api repos/{owner}/{repo}/secret-scanning/alerts?state=resolved --jq '[.[] | select(.resolution != null)]'secret_scanning section, compare and flag state changesRun the Vulnetix VDB fixes command for both V1 and V2 endpoints:
vulnetix vdb fixes "$ARGUMENTS" -o json
vulnetix vdb fixes "$ARGUMENTS" -o json -V v2V1 response (basic fixes):
{
"fixes": [
{
"type": "version",
"package": "log4j-core",
"ecosystem": "maven",
"fixedIn": "2.17.1",
"description": "Upgrade to patched version"
}
]
}V2 response (enhanced with registry, distro, source fixes):
{
"fixes": [
{
"type": "registry",
"package": "log4j-core",
"ecosystem": "maven",
"fixedIn": "2.17.1",
"registryUrl": "https://repo1.maven.org/...",
"releaseDate": "2021-12-28"
},
{
"type": "distro-patch",
"distro": "ubuntu",
"version": "20.04",
"package": "liblog4j2-java",
"patchVersion": "2.17.1-0ubuntu1",
"aptCommand": "sudo apt-get install liblog4j2-java=2.17.1-0ubuntu1"
},
{
"type": "source-fix",
"commitUrl": "https://github.com/apache/logging-log4j2/commit/abc123",
"patchUrl": "https://github.com/apache/logging-log4j2/commit/abc123.patch"
}
]
}Get additional context about the vulnerability:
vulnetix vdb vuln "$ARGUMENTS" -o json
vulnetix vdb affected "$ARGUMENTS" -o json -V v2Extract:
>=2.0.0, <2.17.1)You MUST perform a thorough scan that goes beyond the current working directory. Search the entire project tree including gitignored directories.
#### 3a-pre: Check for Cached SBOMs
Before scanning, check the manifests section of .vulnetix/memory.yaml for recently scanned files. If a manifest was scanned by the pre-commit hook (or a prior skill invocation) within the last 24 hours (last_scanned timestamp), read the cached SBOM from sbom_path instead of re-scanning. This avoids redundant API calls. If the SBOM file is missing or stale, proceed with a fresh scan.
#### 3a: Find All Manifest and Lockfiles
Use Glob to find manifest files across the project, including monorepo structures:
**/package.json, **/package-lock.json, **/yarn.lock, **/pnpm-lock.yaml
**/requirements.txt, **/pyproject.toml, **/Pipfile, **/Pipfile.lock, **/poetry.lock, **/uv.lock
**/go.mod, **/go.sum
**/Cargo.toml, **/Cargo.lock
**/pom.xml, **/build.gradle, **/build.gradle.kts, **/gradle.lockfile
**/Gemfile, **/Gemfile.lock
**/composer.json, **/composer.lock#### 3b: Derive Installed Versions from the Filesystem
Do not rely solely on manifests. Verify the actually-installed version by reading from package manager artifacts. These directories are typically gitignored — read them directly:
node_modules/<package>/package.json → .version field. Also check parent directories and workspace root node_modules/.pip show <package> or read .venv/lib/python/site-packages/<package>/METADATA or __pycache__ dist-info directories.go.sum for exact hashes. Run go list -m -json <package> if go toolchain is available.Cargo.lock for exact resolved versions. Run cargo metadata --format-version 1 if available.~/.m2/repository/<groupPath>/<artifact>/ for cached JARs. Run mvn dependency:tree if available.Gemfile.lock for resolved versions.which <binary> then <binary> --version to determine installed version from PATH.Use Read on each manifest and lockfile to determine:
Before proposing a version bump, evaluate whether the dependency can be removed entirely:
Criteria for inlining (ALL must be true):
lib/, internal/, utils/)Categorize fixes into 5 categories (A0-D) and present them in priority order. Every option MUST include the Safe Harbour confidence score and all version details per the Mandatory Reporting Requirements above.
---
#### A0. Inline as First-Party Code (Best — when viable)
If the inlining evaluation in Step 4 passed:
Package: <name>
Current Version: <version> (source: <version-source>)
Fix: Remove dependency entirely, inline <N> functions as first-party code
Safe Harbour: <score> (typically High — you own the code, no upstream risk)
License: <original license> (attribution preserved in source header)Action: Write inlined module, update all imports, remove from manifests and lockfiles.
---
#### A. Version Bump (Preferred when inlining is not viable)
If a patched version is available in the registry:
| Current Version | Version Source | Target Version | Fix Source | Safe Harbour | Breaking Changes? | Manifest File |
|-----------------|---------------|----------------|------------|-------------|-------------------|---------------|
| 2.14.1 | Lockfile: pom.xml | 2.17.1 | Registry: Maven Central | 0.82 (Reasonable) | Minor API changes | pom.xml |
Action: Update dependency version in manifest file.
Risk assessment:
#### B. Patch (Alternative)
If a source patch or distro patch is available:
| Patch Source | Type | Commit/Version | Safe Harbour | Applicability |
|--------------|------|----------------|-------------|---------------|
| GitHub commit abc123 | Source fix | abc123 | 0.55 (Reasonable) | Can be applied to local fork |
| Ubuntu 20.04 | Distro patch | 2.17.1-0ubuntu1 | 0.75 (Reasonable) | Only if running on Ubuntu |
Action: Download patch and apply to local dependency copy (advanced users only).
---
#### C. Workaround (Temporary Mitigation)
If no fix is available yet, provide temporary mitigations:
---
#### D. Advisory Guidance (Informational)
---
After presenting the options, immediately begin applying the preferred fix (do not wait for a planning interview unless the situation is ambiguous). Apply changes in this order:
#### 6a: Back Up Lockfiles and Manifests for Rollback
Before making any changes, preserve the current state so the user can roll back:
# Copy lockfiles and manifests to a backup location
cp package-lock.json package-lock.json.vulnetix-backup 2>/dev/null
cp yarn.lock yarn.lock.vulnetix-backup 2>/dev/null
cp pom.xml pom.xml.vulnetix-backup 2>/dev/null
# ... for each relevant fileInform the user that backups have been created and how to restore them.
#### 6b: Update Package Manager Manifests
Use Edit to update version constraints in all affected manifest files. Handle version locking and conflicts:
package-lock.json pins a conflicting version, update both package.json and consider running npm install to regenerate the lockfilerequirements.txt version pins. If using pip-compile / pip-tools, update .in filespyproject.toml version constraintsgo.mod require directivesCargo.toml version constraints. Handle workspace-level version overrides in [patch] section<version> in pom.xml. Handle BOM (Bill of Materials) version management in parent POMsbuild.gradle or version catalogoverrides field in package.jsonresolutions field in package.jsonpnpm.overrides in package.json<dependencyManagement> section or <exclusions>[patch] section in Cargo.tomlUse Grep to find all import/require/include statements for the vulnerable package. Where possible, refactor to import only the specific submodules or functions needed rather than the entire package:
JavaScript/TypeScript:
- import lodash from 'lodash'
+ import get from 'lodash/get'
+ import set from 'lodash/set'Python:
- import cryptography
+ from cryptography.hazmat.primitives.ciphers import Cipher, algorithms, modesJava:
- import org.apache.commons.collections.*;
+ import org.apache.commons.collections.CollectionUtils;Go:
// Go imports are already module-path scoped — check if a subpackage can be used instead
- import "github.com/example/biglib"
+ import "github.com/example/biglib/subpkg"This reduces the attack surface by not loading vulnerable code paths that the application never uses.
#### 6d: Dry-Run Package Manager to Verify
After editing manifests, run the package manager in dry-run or check mode to verify the dependency resolution succeeds without actually modifying node_modules/ or equivalents:
# npm
npm install --dry-run# yarn
yarn install --check-files
# pnpm
pnpm install --dry-run
# pip
pip install --dry-run -r requirements.txt
# go
go mod tidy -v # prints what it would change
# cargo
cargo check
# maven
mvn dependency:resolve -DdryRun
# composer
composer install --dry-run
If the dry run fails (e.g., version conflict, missing package), diagnose the issue and either:
#### 6e: Restore on Failure
If any step fails and the fix cannot be completed, restore from backups:
mv package-lock.json.vulnetix-backup package-lock.json 2>/dev/null
# ... for each backed-up fileInform the user what failed and why, and suggest alternative approaches.
After applying fixes:
npm test # npm
pytest # Python
go test ./... # Go
cargo test # Rust
mvn test # Mavenmkdir -p .vulnetix/scans
vulnetix scan --file <manifest> -f cdx17 > .vulnetix/scans/<sanitized-manifest>.cdx.json
- Use the same naming convention as the pre-commit hook: replace / with -- in the manifest path
- This overwrites any prior SBOM for the same manifest, so .vulnetix/scans/ always has the latest scan
- Update the discovery.sbom field in .vulnetix/memory.yaml to point to this fileFix Applied:
Package: <name>
Previous Version: <old> (source: <how determined>)
New Version: <new> (source: <registry|distro|commit>)
Safe Harbour: <score> (<tier> confidence)
Verification: <scan passed|scan still flags|tests passed|tests failed>
Rollback: <backup files created at ...>If the scan still shows the vulnerability, explain that it may be a transitive dependency and suggest:
npm audit fix, cargo update, etc.)After every action in this skill — whether a fix was applied, the user made a decision, or new information was discovered — update .vulnetix/memory.yaml.
#### 8a: Create or Update the Entry
Use Read to load the current file (if it exists), then use Write to update it. If the file does not exist, create it with the schema_version: 1 header.
On first discovery (no prior entry for this vuln ID):
<VULN_ID>:
aliases: [<any known aliases from VDB response>]
package: <package name>
ecosystem: <ecosystem>
discovery:
date: "<current ISO 8601 UTC timestamp>"
source: <manifest|lockfile|sbom|scan|user|hook>
file: <file where found, or null>
sbom: <.vulnetix/scans/<manifest>.cdx.json, or null>
versions:
current: "<detected version>"
current_source: "<how version was determined>"
fixed_in: "<patched version, or null>"
fix_source: "<registry|distro|commit hash, or null>"
severity: <critical|high|medium|low|unknown>
safe_harbour: <0.00-1.00>
status: under_investigation
justification: null
action_response: null
decision:
choice: investigating
reason: "Discovered via /vulnetix:fix"
date: "<current timestamp>"
history:
- date: "<current timestamp>"
event: discovered
detail: "Found <package>@<version> in <file>"On fix applied:
status: fixed, decision.choice: fix-appliedversions.current to the new versionhistory: event: fix-applied, detail: what was donestatus: affected, action_response: will_not_fix, decision.choice: risk-acceptedstatus: not_affected, decision.choice: not-affected, set appropriate justificationstatus: affected, action_response: will_fix, decision.choice: deferredstatus: not_affected, justification: inline_mitigations_already_exist, decision.choice: mitigatedstatus: under_investigation, decision.choice: investigatingstatus: fixed, decision.choice: inlinedstatus: not_affected, justification: component_not_present, decision.choice: risk-avoidedstatus: not_affected, justification: vulnerable_code_cannot_be_controlled_by_adversary, decision.choice: risk-transferreddecision.reasonhistoryWhen recording a user decision, always capture:
reasondateIf Dependabot data was gathered in Step 0c, write it to the dependabot section of the memory entry:
alert_number, alert_state, alert_urldismiss_reason, dismiss_comment (if dismissed)pr_number, pr_state, pr_url, pr_latest_comment (if a PR exists)last_checked: current timestampopen to fixed), append to history: event: dependabot-sync, detail: "Dependabot alert #N: <old state> → <new state>"Do NOT change status or decision based on Dependabot alone if the user has already made a deliberate decision. Only auto-update status from Dependabot if:
decision.choice is investigating)fixed or dismissed with a clear reason)If CodeQL data was gathered in Step 0d, write it to the code_scanning section of the memory entry:
alerts[]: each correlated alert with alert_number, state, rule_id, rule_name, severity, dismissed_reason, dismissed_comment, dismissed_by, file_path, start_line, urltool, tool_version: from the alert's tool fieldlast_checked: current timestamphistory: event: codeql-sync, detail: "CodeQL alert #N (<rule_id>): <old state> → <new state>"Auto-update rules (same principle as Dependabot):
status/decision from CodeQL if no prior user decision existsfixed state is strong evidence the code-level issue is resolved — note in history but let user confirmdismissed with dismissed_comment provides justification context — record it but don't override user decisionsIf secret scanning data was gathered in Step 0e, write it to the secret_scanning section of the memory entry:
alerts[]: each correlated alert with alert_number, state, secret_type, secret_type_display, resolution, resolution_comment, resolved_by, validity, file_path, url, push_protection_bypassedlast_checked: current timestamphistory: event: secret-scanning-sync, detail: "Secret scanning alert #N (<secret_type>): <old state> → <new state>"If a previously active secret is now inactive (revoked), note this as positive progress. If a previously unknown secret is now active, flag urgently.
#### 8f: Handle Aliases
If the VDB response reveals that this vuln ID has aliases (e.g., a CVE maps to a GHSA, or vice versa), update the aliases list. When checking for prior entries in Step 0, always check both the primary ID and all known aliases.
#### 8g: Update Manifests Section
If any manifest files were scanned during this fix workflow (Step 3 or Step 7), update the manifests section of .vulnetix/memory.yaml:
last_scanned to current timestamp, vuln_count to the result, scan_source: fixsbom_generated: true and update sbom_pathpath, ecosystem, and scan metadataAfter writing the memory file, confirm to the user:
Vulnerability memory updated: <VULN_ID> — <developer-friendly status> (<reason summary>)
GitHub security sync: Dependabot <state>, CodeQL <N alerts>, Secret scanning <N alerts>vulnetix vdb fixes returns no results, inform the user that no official fix is available yet and suggest workarounds or monitoring. Still record the vuln in .vulnetix/memory.yaml with status: under_investigation.status: not_affected, justification: component_not_present if confirmed absent..vulnetix/memory.yaml cannot be written (permissions, etc.), warn the user but do not block the fix workflow/vulnetix:exploits $ARGUMENTS first to understand impact/vulnetix:package-search if adding new dependencies as alternatives/vulnetix:exploits and /vulnetix:package-search skills also read and contribute to .vulnetix/memory.yaml — decisions made in any skill are visible to all othersWeekly roundup of top Claude Code skills, MCP servers, and AI coding tips.