Safer Python package install and scan tool with provenance checks, CVE lookups, Docker + Trivy deep mode, and signed receipts
Project description
depshieldx
depshieldx is a safer wrapper around Python package install and scan workflows.
Before installing, it resolves the full package set, checks provenance for the exact artifacts that would be used, queries four vulnerability sources for the resolved versions, and can optionally run a deeper Docker + Trivy validation path. Every completed install or scan also writes signed local receipt JSON files.
Installation
Install the published package from PyPI:
python -m pip install depshieldx
If your machine has multiple Python versions, use a Python 3.11.4+ interpreter explicitly:
python3.11 -m pip install depshieldx
Project links:
- PyPI: https://pypi.org/project/depshieldx/
- Docs: https://tee-wealth001.github.io/depshieldx/
- Source: https://github.com/tee-wealth001/depshieldx
What It Does
- resolves the full dependency set before installation
- checks provenance for the selected release artifacts on PyPI
- verifies PyPI attestations when they are available
- queries 4 vulnerability sources for the resolved package versions:
- OSV
- GitHub Advisories
- CISA KEV
- deps.dev
- supports a deeper Docker + Trivy scan mode
- writes signed local receipts for installs and scans
Quick Start
Install with the default path:
depshieldx install requests
Run the deeper validation path:
depshieldx install requests --deep
Scan without installing:
depshieldx scan requests
Scan a requirements file:
depshieldx scan -r requirements.txt
Install from pyproject.toml:
depshieldx install --pyproject pyproject.toml
Requirements
depshieldx is safest when the local runtime tools are current:
- Python
3.11.4or newer pip25.3or newer- Docker installed and running for
--deep - Trivy installed for the deeper container scan path
Install local development and release tooling with:
python -m pip install -e ".[dev]"
Platform Support
depshieldx works best where the local Python, pip, Docker, and browser integration are set up cleanly.
- the local UI is localhost-only and uses the Python standard library browser/server stack, so it is the most platform-friendly part of the project
- the core fast scan and install flow is intended to be portable across macOS, Linux, and Windows
- routing now creates a Windows batch shim on Windows and a shell shim on POSIX systems
- deep mode depends on Docker and Trivy, and some of the sandbox internals are still Unix-oriented
Windows support is improving, but macOS and Linux still have the broadest day-to-day coverage in the codebase and docs.
Modes
depshieldx has two modes:
fastdeep
Plain install and plain scan default to fast.
Fast mode
Fast mode:
- resolves the exact package versions that would be installed
- checks provenance for the resolved package set
- queries OSV, GitHub Advisories, CISA KEV, and deps.dev
- blocks if any resolved package or dependency is reported as vulnerable by the blocking sources
Fast mode does not use Docker or Trivy.
Deep mode
Deep mode does everything in fast mode first, then:
- installs the resolved package set in Docker
- runs Trivy on the sandboxed install result
- blocks if the Docker environment is unavailable or Trivy returns blocking findings
For install --deep, the host install only happens after the fast checks and the Docker + Trivy stage both pass.
depshieldx shells out to the local pip for resolution, download, and host install steps, so keeping pip up to date is part of the security model.
Install vs Scan
install and scan use the same fast/deep validation logic.
The only difference is:
installinstalls on the host after the checks passscanstops after the checks and does not install anything
This same behavior applies to:
- direct package names
- multiple package names in one command
requirements.txtuv.lockpyproject.toml
Commands
Main commands:
depshieldx installdepshieldx scandepshieldx uninstalldepshieldx uidepshieldx routing statusdepshieldx routing enabledepshieldx routing disabledepshieldx receipts listdepshieldx receipts verify <path>depshieldx receipts delete
Get help at any level:
depshieldx --help
depshieldx install --help
depshieldx scan --help
depshieldx uninstall --help
depshieldx ui --help
depshieldx receipts --help
Local UI
depshieldx ui opens a local, read-only browser view over cached receipts and related cache entries.
- binds to
127.0.0.1only - uses port
0by default so the OS can choose a free port - opens the browser automatically unless you pass
--no-open
Examples:
depshieldx ui
depshieldx ui --port 8765
depshieldx ui --no-open
Release Notes
For a release build:
- confirm the included Apache 2.0 license still matches how you want to distribute the project
- build and verify distributions in a Python
3.11.4+environment - run
python -m build - run
python -m twine check dist/* - for TestPyPI, run the
Release Checksworkflow manually - for PyPI, push a version tag such as
v0.1.0
Common Examples
Install one package:
depshieldx install fastapi
Install multiple packages:
depshieldx install langchain requests --deep
Scan only:
depshieldx scan fastapi --fast
depshieldx scan fastapi --deep
Use a requirements file:
depshieldx install -r requirements.txt
depshieldx scan -r requirements.txt --deep
Use a lockfile:
depshieldx install --lockfile uv.lock
depshieldx scan --lockfile uv.lock
Use a pyproject.toml file:
depshieldx install --pyproject pyproject.toml
depshieldx scan --pyproject pyproject.toml --deep
Open the local cache UI:
depshieldx ui
depshieldx ui --port 8765
depshieldx ui --no-open
Uninstall packages:
depshieldx uninstall requests
depshieldx uninstall -r requirements.txt
depshieldx uninstall --pyproject pyproject.toml
Supported Inputs
depshieldx accepts:
- one package name
- multiple package names
-r requirements.txt--lockfile uv.lock--pyproject pyproject.toml
Current lockfile behavior:
uv.lockis parsed directly- other lockfile-style inputs are treated like requirement-style pinned targets
Output Modes
Human-readable summary:
depshieldx install requests --output summary
JSON only:
depshieldx install requests --output json
Summary plus JSON:
depshieldx install requests --output both
depshieldx install requests --full-report
What The Summary Means
Key summary lines:
Scan verdictCVE sources across all resolved packagesProvenance verdictAttestation verificationSandbox verdictTrivy verdictHost installReceipts
Scan verdict reflects the resolved package set, including dependencies.
Provenance verdict means the provenance checks did or did not block. A package can still pass provenance and show informational items such as:
- missing author or maintainer email
- missing PyPI attestations
That is expected. passed means "not blocked", not "perfect metadata".
Attestation verification describes how many attested selected files verified successfully. It does not mean every package had attestations.
historical/fixed CVEs mean the source knows about past vulnerabilities in the package history, but not in the exact versions currently selected for install.
Example summary:
Summary
Package: fastapi
Mode: fast
Install target: fastapi==0.135.2
Resolved packages: 10
Scan verdict: passed with 0 warning(s), 0 info item(s)
CVE sources across all resolved packages:
• cisa-kev: no vulnerabilities
• deps-dev: 0 advisories, 10 package record(s) checked
• github-advisories: no vulnerabilities
• osv: 0 affecting resolved version(s), 15 historical/fixed entries in resolved dependency history
Provenance verdict: passed with 0 warning(s), 0 info item(s)
Attestation verification: 7/7 attested file(s) verified, available
Host install: succeeded (fastapi==0.135.2, https://pypi.org/project/fastapi/0.135.2/)
Receipts: allowed (1 package receipt)
Receipt ID: abc123def4567890
Receipt path:
- /Users/you/.depshieldx-cache/receipts/20260331T000000Z-fastapi-0.135.2-abc123def4567890.json
For multi-package installs, the summary also includes:
- a requested-package source breakdown
- one receipt path per requested package
- one PyPI project link per requested package when relevant
Provenance And Attestations
The provenance stage checks the exact artifacts selected for your environment, not every file on the PyPI release page.
It currently looks at things like:
- whether the release exists on PyPI
- whether the release is source-only
- whether the release is a pre-release
- whether homepage/project URLs exist
- whether author or maintainer email metadata exists
- whether the selected files have PyPI attestations
- whether those attestations verify successfully
Vulnerability Sources
Fast and deep mode both query these four sources concurrently:
- OSV
- GitHub Advisories
- CISA KEV
- deps.dev
deps.dev output is shown as:
deps-dev: 0 advisories, 43 package record(s) checked
That means:
- how many advisory references deps.dev reported
- how many resolved package-version records were successfully checked
Receipts
Every completed install or scan attempts to write signed local receipt JSON files.
Important receipt behavior:
- single-package runs produce one receipt
- multi-package runs produce one receipt per requested package
- requirements, lockfile, and
pyproject.tomlruns also write per-requested-package receipts when possible
Receipt commands:
depshieldx receipts list
depshieldx receipts verify ~/.depshieldx-cache/receipts/<receipt>.json
depshieldx receipts delete
Receipts include package-level details such as:
- package and resolved version
- project link
- provenance summary
- scan summary
- historical/fixed CVE entries for that package
Routing
depshieldx can optionally install a small pip shim so simple pip install <package> commands go through depshieldx.
depshieldx routing status
depshieldx routing enable
depshieldx routing disable
Routing is platform-aware:
- on macOS and Linux it creates a
pipshell shim - on Windows it creates a
pip.batshim
Useful environment variables:
DEPSHIELDX_CACHE_DIRDEPSHIELDX_RECEIPTS_DIRDEPSHIELDX_NO_ROUTING_PROMPT=1DEPSHIELDX_ROUTE_DEEP=1
Cache Location
By default, local state lives under:
~/.depshieldx-cache
That directory can contain:
- provenance cache entries
- deep-scan cache entries
- receipts
- routing state
You can inspect those cached results in the local browser UI with:
depshieldx ui
Exit Codes
0: success10: blocked by resolution, provenance, vulnerability checks, or Trivy11: deep mode could not use Docker and the install or scan was skipped for that reason12: host install was attempted but failed
Limitations
- deep mode depends on Docker being available
- deep mode also depends on Trivy being installed
- deep mode is slower than fast mode
- the safety guarantees depend in part on the local Python and
pipversions - some packages publish no PyPI attestations; that is usually informational
- attestation verification can depend on upstream trust metadata availability
- vulnerability-source coverage depends on the upstream services
FAQ
Does it scan dependencies too?
Yes. The resolved dependency set is scanned, not just the top-level package you typed.
Will install --deep and scan --deep behave the same way?
Yes, except install performs the final host install and scan does not.
What should I use most of the time?
Use:
depshieldx install <package>
Use --deep when you want the extra Docker + Trivy validation step.
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file depshieldx-0.1.1.tar.gz.
File metadata
- Download URL: depshieldx-0.1.1.tar.gz
- Upload date:
- Size: 101.2 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
6668088195cf1fb83b5b6f4a583b0eb58de1070ebaa9443b27352dc937ea1db3
|
|
| MD5 |
9eb152d51c8312fab79d5e4add272852
|
|
| BLAKE2b-256 |
6657fc50cdcf0f5d6f9c55734d408af10e7bcf723008409099042ab991b2c47a
|
Provenance
The following attestation bundles were made for depshieldx-0.1.1.tar.gz:
Publisher:
publish.yml on tee-wealth001/depshieldx
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
depshieldx-0.1.1.tar.gz -
Subject digest:
6668088195cf1fb83b5b6f4a583b0eb58de1070ebaa9443b27352dc937ea1db3 - Sigstore transparency entry: 1203833922
- Sigstore integration time:
-
Permalink:
tee-wealth001/depshieldx@60ad30b6e239866c2930f911d076d67fadbab959 -
Branch / Tag:
refs/tags/v0.1.1 - Owner: https://github.com/tee-wealth001
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@60ad30b6e239866c2930f911d076d67fadbab959 -
Trigger Event:
push
-
Statement type:
File details
Details for the file depshieldx-0.1.1-py3-none-any.whl.
File metadata
- Download URL: depshieldx-0.1.1-py3-none-any.whl
- Upload date:
- Size: 79.0 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
817dd77049d818a44027f738d9cfa43313f6cc654466d4d93e7d6e77972349b6
|
|
| MD5 |
45565d08935f97d5a19f6bc7fb2618ac
|
|
| BLAKE2b-256 |
21cc0b8f16657227a38325c11716e3e7255123c40e104ac623250e0b9ae8ef3b
|
Provenance
The following attestation bundles were made for depshieldx-0.1.1-py3-none-any.whl:
Publisher:
publish.yml on tee-wealth001/depshieldx
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
depshieldx-0.1.1-py3-none-any.whl -
Subject digest:
817dd77049d818a44027f738d9cfa43313f6cc654466d4d93e7d6e77972349b6 - Sigstore transparency entry: 1203833933
- Sigstore integration time:
-
Permalink:
tee-wealth001/depshieldx@60ad30b6e239866c2930f911d076d67fadbab959 -
Branch / Tag:
refs/tags/v0.1.1 - Owner: https://github.com/tee-wealth001
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@60ad30b6e239866c2930f911d076d67fadbab959 -
Trigger Event:
push
-
Statement type: