Skip to main content

CLI tool for auditing open-source packages: version, CVEs, downloads, and replacement validation

Project description

veripak

Audit open-source package health: version staleness, EOL status, CVE exposure, download validation, and replacement checking.

Install

pip install veripak

# With MCP server support (for AI coding assistants)
pip install veripak[mcp]

Requires Python 3.10+.

Using with AI agents

veripak integrates with AI coding assistants and agents through two paths: an MCP server for tool-calling agents, and JSON CLI output for agents with shell access.

MCP server

veripak serve runs veripak as an MCP server over stdio transport. It operates in deterministic-only mode -- querying authoritative sources directly (PyPI, npm, Maven Central, OSV.dev, NVD, endoflife.date) without making any LLM calls. The calling agent's own LLM reasons over the raw data. This is faster and avoids redundant LLM costs.

The server exposes a single tool, veripak_check_package, with these parameters:

Parameter Required Description
package Yes Package name (e.g. requests, lodash, log4j)
ecosystem No Package ecosystem -- inferred automatically if omitted
versions_in_use No List of deployed versions for CVE matching
replacement No Replacement package name to validate
skip_cves No Skip the CVE vulnerability check
skip_download No Skip download URL validation

The response includes a data_gaps field that tells the calling agent what couldn't be verified and why (missing API keys, package not found in a database, rate limits hit, etc.). This lets the agent adjust its reasoning rather than treating missing data as a clean bill of health.

CLI with --json

Any agent with shell access can call veripak directly -- no MCP setup needed. This works with Pi, Aider, or any tool that can invoke a command and parse JSON output:

veripak check requests --ecosystem python --versions 2.28.0 --json

The --json path runs the full agent pipeline (including LLM calls), so it requires a configured LLM backend (veripak config). In exchange, you get richer analysis: the pipeline reasons about ambiguous signals, writes a security summary, and flags items for human review. The MCP server path gives raw structured data only — faster, cheaper, no LLM backend required.

Both paths include a veripak_version field in their JSON output for provenance tracking.

MCP setup guides

Claude Code

Add via CLI:

claude mcp add veripak -e TAVILY_API_KEY=tvly-xxx -e NVD_API_KEY=xxx -- veripak serve

Or in your project's .mcp.json:

{
  "mcpServers": {
    "veripak": {
      "command": "veripak",
      "args": ["serve"],
      "env": {
        "TAVILY_API_KEY": "your-key-here",
        "NVD_API_KEY": "your-key-here"
      }
    }
  }
}

Claude Desktop

In Settings > Developer > Edit Config (claude_desktop_config.json):

{
  "mcpServers": {
    "veripak": {
      "command": "veripak",
      "args": ["serve"],
      "env": {
        "TAVILY_API_KEY": "your-key-here",
        "NVD_API_KEY": "your-key-here"
      }
    }
  }
}

Codex (OpenAI)

In ~/.codex/config.toml:

[mcp_servers.veripak]
command = "veripak"
args = ["serve"]

[mcp_servers.veripak.env]
TAVILY_API_KEY = "your-key-here"
NVD_API_KEY = "your-key-here"

Continue (VS Code / JetBrains)

In .continue/config.yaml:

mcpServers:
  - name: veripak
    command: veripak
    args:
      - serve
    env:
      TAVILY_API_KEY: your-key-here
      NVD_API_KEY: your-key-here

MCP tools are only available in Continue's Agent mode.

OpenCode

In opencode.json:

{
  "mcp": {
    "veripak": {
      "type": "local",
      "command": ["veripak", "serve"],
      "environment": {
        "TAVILY_API_KEY": "your-key-here",
        "NVD_API_KEY": "your-key-here"
      }
    }
  }
}

Pi

Pi does not support MCP by design — its author argues that MCP tool manifests consume too much context. Pi uses "Skills" (CLI tools with README docs) instead. Since veripak is already a CLI tool, Pi can invoke it directly via its bash tool:

veripak check requests --ecosystem python --versions 2.28.0 --json

No additional configuration needed. Pi will discover veripak's capabilities from its --help output.

The community fork oh-my-pi does add native MCP support. If you're using that fork, configure it the same way as Claude Desktop (JSON with mcpServers key).

Both TAVILY_API_KEY and NVD_API_KEY are included in the examples above. See API keys for details on obtaining them.

CLI usage

Both veripak and vpk work as entry points. Check the installed version with veripak --version.

Configure your LLM backend and API keys interactively:

veripak config

Or set individual values programmatically:

veripak config set llm_backend anthropic
veripak config set anthropic_api_key sk-ant-...
veripak config get llm_backend
veripak config list

Run an audit:

$ veripak check django --ecosystem python --versions 4.2.0

  Package:     django  (python)
  EOL:         supported  (cycle 4.2, latest patch: 4.2.16)
  Version:     5.1.6  [pypi]
  Download:    confirmed  [pypi]
  CVEs:        3 total  (1 HIGH/CRITICAL)  [osv]

  Summary:
    Version gap:    4 minor versions behind
    Migration:      moderate  (breaking change likely)
    Urgency:        MEDIUM
    Recommend:      Update to 5.1.x; review breaking changes in 5.0 release notes
# Basic check (ecosystem inferred automatically)
veripak check requests

# Specify ecosystem and versions in use
veripak check log4j --ecosystem java --versions 2.14.0,2.15.0

# Machine-readable JSON output
veripak check openssl --ecosystem c --json

# Skip CVE check (faster)
vpk check requests --no-cves

# Skip download validation
vpk check lodash --ecosystem javascript --no-download

# Check a replacement package
veripak check nose --ecosystem python --replacement pytest

Additional flags: --verbose (show agent debug info and token usage), --release-notes-url, --repository-url, --homepage, --download-url (supply known URLs to skip discovery), and --no-summary (skip AI security summary). Run veripak check --help for the full list.

Note: if a package name exists in multiple ecosystems (e.g., jsoup on both PyPI and Maven), veripak will ask you to specify --ecosystem rather than guessing.

API keys

Key Required Purpose
TAVILY_API_KEY Recommended Web search for non-registry ecosystems (c, cpp, system). Not strictly required for registry-based ecosystems. Get a key (free tier: 1,000 requests/month).
NVD_API_KEY Recommended CVE lookups via the National Vulnerability Database. Without a key, rate limits are 5 requests per 30 seconds; with one, 50 per 30 seconds. Request a key (free, instant via email).
ANTHROPIC_API_KEY CLI only LLM calls via the Anthropic SDK for the agent pipeline. Not needed when using the MCP server.
OPENAI_API_KEY CLI only LLM calls via the OpenAI SDK (when using the openai or vllm backend). Not needed when using the MCP server.

Keys are resolved in this order: environment variables (highest priority), then ~/.config/veripak/config.json, then .env in the project root.

Run veripak config to set keys and LLM backend interactively. The config wizard stores values in ~/.config/veripak/config.json. For MCP server deployments, environment variables are usually more convenient since you pass them directly in the server configuration.

Supported ecosystems

veripak supports packages from 7 registry-backed ecosystems (PyPI, npm, Maven Central, Go proxy, NuGet, MetaCPAN, Packagist) plus a catch-all for non-registry software (C/C++ libraries, system packages, desktop apps, drivers) that uses web search + LLM inference.

Ecosystem Version source CVE source
python PyPI API OSV.dev
javascript npm registry OSV.dev
java Maven Central OSV.dev
go Go proxy OSV.dev
dotnet NuGet API OSV.dev
perl MetaCPAN OSV.dev
php Packagist OSV.dev
c, cpp, system, desktop-app, driver Tavily + LLM NVD API

veripak vs OSV-Scanner

Google's OSV-Scanner is a purpose-built vulnerability scanner designed for CI pipelines. It scans lockfiles and dependency manifests, checks them against the OSV database, and exits with a non-zero code if vulnerabilities are found. It's fast, lightweight, and the right tool for CI gates.

veripak is a holistic dependency health auditor. Beyond CVE exposure, it checks version staleness, end-of-life status, download availability, and replacement package viability. The CLI runs LLM agents that reason about ambiguous signals and flag items for human review. The MCP server gives AI coding assistants structured access to the same data sources so they can make informed dependency decisions.

Use OSV-Scanner in your CI pipeline. Use veripak (especially via MCP) when an AI agent or a human needs to evaluate whether a dependency is healthy, not just whether it has known vulnerabilities.

How it works

This section describes the internal architecture -- useful for contributors and anyone curious about what happens under the hood.

The CLI runs a parallel agent-based pipeline where LLM agents handle non-deterministic lookups (EOL reasoning, CVE triage, ecosystem inference) and deterministic checkers handle registry APIs:

                    +-------------------------+
                    |      PACKAGE INPUT      |
                    |  name, versions_in_use, |
                    |  urls, replacement_name |
                    +-----------+-------------+
                                |
                    +-----------v-------------+
                    |   E0: ECOSYSTEM AGENT   |
                    |                         |
                    |  1. LLM: "What is this?"|
                    |     -> "java" (instant)  |
                    |                         |
                    |  2. Validate: probe     |
                    |     Maven/PyPI/npm/etc  |
                    |     -> confirmed        |
                    |                         |
                    |  3. If no hit: Tavily   |
                    |     search to confirm   |
                    +-----------+-------------+
                                |
                  +-------------+-------------+
                  |       FORK (parallel)     |
                  |                           |
         +--------v--------+     +------------v-----------+
         |  TRACK A        |     |  TRACK B               |
         |                 |     |                        |
         |  N1: VERSION    |     |  EOL AGENT             |
         |  (registry API) |     |  (single agentic loop) |
         |       |         |     |                        |
         |       v         |     |  - Is version EOL?     |
         |  N2: DOWNLOAD   |     |  - Is project dead?    |
         |   discovery     |     |  - What's the          |
         |       |         |     |    replacement?        |
         |       v         |     |                        |
         |  N3: DOWNLOAD   |     |                        |
         |   validation    |     +------------+-----------+
         +--------+--------+                  |
                  +-------------+-------------+
                                |
                          JOIN  |
                                |
                  +-------------+-------------+
                  |       FORK (parallel)     |
                  |                           |
         +--------v--------+     +------------v-----------+
         |  TRACK C        |     |  TRACK D               |
         |                 |     |                        |
         |  N5: REPLACEMENT|     |  CVE AGENT             |
         |  VALIDATION     |     |  (agentic loop)        |
         |  (only if EOL   |     |                        |
         |   agent found   |     |  Uses: version from    |
         |   a replacement |     |  Track A, EOL status   |
         |   to validate)  |     |  from Track B          |
         +--------+--------+     +------------+-----------+
                  |                            |
                  +-------------+--------------+
                                |
                          JOIN  |
                                |
                    +-----------v-------------+
                    |  N6: SUMMARY AGENT      |
                    |                         |
                    |  All raw results +      |
                    |  deterministic guards + |
                    |  HITL flags propagated  |
                    +-----------+-------------+
                                |
                    +-----------v-------------+
                    |    FINAL RESULT JSON    |
                    +-------------------------+

Four specialized LLM agents (Ecosystem, EOL, CVE, Summary) enable reasoning about gaps and iterating on incomplete results. The agents use tools (registry probes, web search, GitHub API, advisory page fetching) and can flag fields for human review when data sources are inaccessible or signals are contradictory. Tracks A+B and C+D run in parallel via ThreadPoolExecutor.

MCP server path: When running as an MCP server (veripak serve), the LLM agents are bypassed entirely. The pipeline uses deterministic checkers only -- direct API calls to package registries, OSV.dev, NVD, and endoflife.date. The calling agent's LLM handles interpretation of the raw results.

Documentation

The docs/ directory contains maintainer reference material. Design specs and retrospectives live in planning/, and technical investigations in research/. See docs/README.md for a full index.

Development

# Clone and install for development (includes MCP dependencies)
git clone https://github.com/rdwj/veripak.git
cd veripak
python -m venv .venv && source .venv/bin/activate
pip install -e ".[dev]"

# Run tests
pytest

# Run tests with coverage
pytest --cov=veripak --cov-report=term-missing

# Lint
ruff check src tests

# Build distribution
python -m build

Line length limit: 100 (ruff). Rule sets: E, W, F, I, B, C4, UP.

License

MIT — see LICENSE.

Changelog

0.6.3

  • Provenance tracking: JSON output now includes a top-level veripak_version field so downstream consumers can record which version produced each finding

0.6.2

  • Urgency ceiling for 0-CVE packages: the summary now caps urgency at medium when a package has zero CVEs and EOL is not confirmed, preventing the LLM from escalating to high/immediate based on uncertain signals alone
  • Java version convergence: bare artifact names (e.g. jsoup) now resolve through maven-metadata.xml instead of relying solely on the Solr search endpoint, ensuring they return the same version as their coordinate form (org.jsoup:jsoup)
  • Sparse fields contract: documented the four legitimately nullable summary fields (eol_date, version_gap, upgrade_path, recommendation) so downstream consumers know what to null-check vs what indicates missing data

0.6.1

  • Thread-safe NVD rate limiter: the sliding-window rate limiter for NVD API requests is now guarded by a threading.Lock, fixing a race condition that could defeat rate limiting under concurrent use
  • Deterministic summary fallback: after the LLM summary returns, null fields are now filled from raw audit data (CVE counts, EOL status/date, versions, urgency), eliminating most _gaps entries for successful audits

0.6.0

  • JSON response format enforcement: LLM calls that expect JSON output now use API-level enforcement (response_format for OpenAI-compatible backends, assistant prefill for Anthropic), with graceful fallback for backends that don't support it
  • Documentation reorganized: docs, research, and planning directories restructured; docs index and llms.txt added

0.5.0

  • CVE cross-validation: LLM-sourced CVE IDs are now verified against OSV.dev and NVD before inclusion in results; unverified CVEs are dropped with a HITL flag
  • Maven coordinate support: groupId:artifactId format (e.g., org.jsoup:jsoup) now resolves correctly via Maven metadata XML instead of the stale Solr search endpoint
  • Ecosystem ambiguity detection: when a package name exists in multiple registries (e.g., jsoup on both PyPI and Maven), veripak requires --ecosystem instead of silently picking one
  • EOL release-date heuristic: when endoflife.date has no data, veripak falls back to last-release-date analysis (active / maintenance / possibly EOL) for PyPI, npm, Maven, and Go packages
  • Non-interactive config: veripak config set <key> <value>, veripak config get <key>, and veripak config list for programmatic configuration
  • Verbose flag: --verbose / -v controls visibility of agent debug info and token usage; these fields are now hidden by default in both human-readable and JSON output

0.4.1

  • Remove remaining litellm references from documentation and comments

0.4.0

  • Replace litellm with direct openai + anthropic SDKs for improved security and reduced dependency footprint

0.3.0

  • MCP server support (veripak serve) with FastMCP v3
  • veripak --version flag
  • Deterministic-only pipeline mode for MCP integration
  • Environment variable support for API key configuration
  • Data gap reporting in MCP responses

0.2.0

  • Parallel agent-based pipeline (v2) replacing serial checker pipeline
  • Token usage tracking and cost estimation
  • Agent budget exhaustion handling
  • EOL cross-pollination from EOL agent to version track
  • Summary prompt refinements for accuracy
  • Project automation: CLAUDE.md, /create-release slash command, .claude/ configuration

0.1.0

  • Initial release with hybrid agent/checker architecture
  • CLI with veripak check and veripak config commands
  • Support for Ollama, Anthropic, OpenAI, and vLLM backends
  • CI/CD pipeline with GitHub Actions and PyPI trusted publishing

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

veripak-0.6.3.tar.gz (136.5 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

veripak-0.6.3-py3-none-any.whl (86.0 kB view details)

Uploaded Python 3

File details

Details for the file veripak-0.6.3.tar.gz.

File metadata

  • Download URL: veripak-0.6.3.tar.gz
  • Upload date:
  • Size: 136.5 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for veripak-0.6.3.tar.gz
Algorithm Hash digest
SHA256 c2ad95cf1e35d79a806acdad6bacbdf9c1c88d9dc90cedda07ca07633222a1ba
MD5 fbc572ca39b89ef9dbbe58e2adb7b7bd
BLAKE2b-256 424d04f5422e31814adad288cf07965872d39f9c5b434ac812dd394efb896ab2

See more details on using hashes here.

Provenance

The following attestation bundles were made for veripak-0.6.3.tar.gz:

Publisher: release.yml on rdwj/veripak

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file veripak-0.6.3-py3-none-any.whl.

File metadata

  • Download URL: veripak-0.6.3-py3-none-any.whl
  • Upload date:
  • Size: 86.0 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.13.12

File hashes

Hashes for veripak-0.6.3-py3-none-any.whl
Algorithm Hash digest
SHA256 f43162b1b248ce9aa0710577d8675fd7a3d622e5a0e6305d650769fe514a41a2
MD5 8f27076b4038f75307f12e6ddacd5c7a
BLAKE2b-256 c1db144087d014a02384c4ec3ec1208594dfa4c98e13ff11bf4d4ad05f500df3

See more details on using hashes here.

Provenance

The following attestation bundles were made for veripak-0.6.3-py3-none-any.whl:

Publisher: release.yml on rdwj/veripak

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page