CLI tool for auditing open-source packages: version, CVEs, downloads, and replacement validation
Project description
veripak
Audit open-source package health: version staleness, EOL status, CVE exposure, download validation, and replacement checking.
Install
pip install veripak
# With MCP server support (for AI coding assistants)
pip install veripak[mcp]
Requires Python 3.10+.
Using with AI agents
veripak integrates with AI coding assistants and agents through two paths: an MCP server for tool-calling agents, and JSON CLI output for agents with shell access.
MCP server
veripak serve runs veripak as an MCP server over stdio transport. It operates in deterministic-only mode -- querying authoritative sources directly (PyPI, npm, Maven Central, OSV.dev, NVD, endoflife.date) without making any LLM calls. The calling agent's own LLM reasons over the raw data. This is faster and avoids redundant LLM costs.
The server exposes a single tool, veripak_check_package, with these parameters:
| Parameter | Required | Description |
|---|---|---|
package |
Yes | Package name (e.g. requests, lodash, log4j) |
ecosystem |
No | Package ecosystem -- inferred automatically if omitted |
versions_in_use |
No | List of deployed versions for CVE matching |
replacement |
No | Replacement package name to validate |
skip_cves |
No | Skip the CVE vulnerability check |
skip_download |
No | Skip download URL validation |
The response includes a data_gaps field that tells the calling agent what couldn't be verified and why (missing API keys, package not found in a database, rate limits hit, etc.). This lets the agent adjust its reasoning rather than treating missing data as a clean bill of health.
CLI with --json
Any agent with shell access can call veripak directly -- no MCP setup needed. This works with Pi, Aider, or any tool that can invoke a command and parse JSON output:
veripak check requests --ecosystem python --versions 2.28.0 --json
The --json path runs the full agent pipeline (including LLM calls), so it requires a configured LLM backend (veripak config). In exchange, you get richer analysis: the pipeline reasons about ambiguous signals, writes a security summary, and flags items for human review. The MCP server path gives raw structured data only — faster, cheaper, no LLM backend required.
MCP setup guides
Claude Code
Add via CLI:
claude mcp add veripak -e TAVILY_API_KEY=tvly-xxx -e NVD_API_KEY=xxx -- veripak serve
Or in your project's .mcp.json:
{
"mcpServers": {
"veripak": {
"command": "veripak",
"args": ["serve"],
"env": {
"TAVILY_API_KEY": "your-key-here",
"NVD_API_KEY": "your-key-here"
}
}
}
}
Claude Desktop
In Settings > Developer > Edit Config (claude_desktop_config.json):
{
"mcpServers": {
"veripak": {
"command": "veripak",
"args": ["serve"],
"env": {
"TAVILY_API_KEY": "your-key-here",
"NVD_API_KEY": "your-key-here"
}
}
}
}
Codex (OpenAI)
In ~/.codex/config.toml:
[mcp_servers.veripak]
command = "veripak"
args = ["serve"]
[mcp_servers.veripak.env]
TAVILY_API_KEY = "your-key-here"
NVD_API_KEY = "your-key-here"
Continue (VS Code / JetBrains)
In .continue/config.yaml:
mcpServers:
- name: veripak
command: veripak
args:
- serve
env:
TAVILY_API_KEY: your-key-here
NVD_API_KEY: your-key-here
MCP tools are only available in Continue's Agent mode.
OpenCode
In opencode.json:
{
"mcp": {
"veripak": {
"type": "local",
"command": ["veripak", "serve"],
"environment": {
"TAVILY_API_KEY": "your-key-here",
"NVD_API_KEY": "your-key-here"
}
}
}
}
Pi
Pi does not support MCP by design — its author argues that MCP tool manifests consume too much context. Pi uses "Skills" (CLI tools with README docs) instead. Since veripak is already a CLI tool, Pi can invoke it directly via its bash tool:
veripak check requests --ecosystem python --versions 2.28.0 --json
No additional configuration needed. Pi will discover veripak's capabilities from its --help output.
The community fork oh-my-pi does add native MCP support. If you're using that fork, configure it the same way as Claude Desktop (JSON with mcpServers key).
Both TAVILY_API_KEY and NVD_API_KEY are included in the examples above. See API keys for details on obtaining them.
CLI usage
Both veripak and vpk work as entry points. Check the installed version with veripak --version.
Configure your LLM backend and API keys:
veripak config
Run an audit:
$ veripak check django --ecosystem python --versions 4.2.0
Package: django (python)
EOL: supported (cycle 4.2, latest patch: 4.2.16)
Version: 5.1.6 [pypi]
Download: confirmed [pypi]
CVEs: 3 total (1 HIGH/CRITICAL) [osv]
Summary:
Version gap: 4 minor versions behind
Migration: moderate (breaking change likely)
Urgency: MEDIUM
Recommend: Update to 5.1.x; review breaking changes in 5.0 release notes
# Basic check (ecosystem inferred automatically)
veripak check requests
# Specify ecosystem and versions in use
veripak check log4j --ecosystem java --versions 2.14.0,2.15.0
# Machine-readable JSON output
veripak check openssl --ecosystem c --json
# Skip CVE check (faster)
vpk check requests --no-cves
# Skip download validation
vpk check lodash --ecosystem javascript --no-download
# Check a replacement package
veripak check nose --ecosystem python --replacement pytest
Additional flags: --release-notes-url, --repository-url, --homepage, --download-url (supply known URLs to skip discovery), and --no-summary (skip AI security summary). Run veripak check --help for the full list.
API keys
| Key | Required | Purpose |
|---|---|---|
TAVILY_API_KEY |
Recommended | Web search for non-registry ecosystems (c, cpp, system). Not strictly required for registry-based ecosystems. Get a key (free tier: 1,000 requests/month). |
NVD_API_KEY |
Recommended | CVE lookups via the National Vulnerability Database. Without a key, rate limits are 5 requests per 30 seconds; with one, 50 per 30 seconds. Request a key (free, instant via email). |
ANTHROPIC_API_KEY |
CLI only | LLM calls via litellm for the agent pipeline. Not needed when using the MCP server. |
Keys are resolved in this order: environment variables (highest priority), then ~/.config/veripak/config.json, then .env in the project root.
Run veripak config to set keys and LLM backend interactively. The config wizard stores values in ~/.config/veripak/config.json. For MCP server deployments, environment variables are usually more convenient since you pass them directly in the server configuration.
Supported ecosystems
veripak supports packages from 7 registry-backed ecosystems (PyPI, npm, Maven Central, Go proxy, NuGet, MetaCPAN, Packagist) plus a catch-all for non-registry software (C/C++ libraries, system packages, desktop apps, drivers) that uses web search + LLM inference.
| Ecosystem | Version source | CVE source |
|---|---|---|
| python | PyPI API | OSV.dev |
| javascript | npm registry | OSV.dev |
| java | Maven Central | OSV.dev |
| go | Go proxy | OSV.dev |
| dotnet | NuGet API | OSV.dev |
| perl | MetaCPAN | OSV.dev |
| php | Packagist | OSV.dev |
| c, cpp, system, desktop-app, driver | Tavily + LLM | NVD API |
veripak vs OSV-Scanner
Google's OSV-Scanner is a purpose-built vulnerability scanner designed for CI pipelines. It scans lockfiles and dependency manifests, checks them against the OSV database, and exits with a non-zero code if vulnerabilities are found. It's fast, lightweight, and the right tool for CI gates.
veripak is a holistic dependency health auditor. Beyond CVE exposure, it checks version staleness, end-of-life status, download availability, and replacement package viability. The CLI runs LLM agents that reason about ambiguous signals and flag items for human review. The MCP server gives AI coding assistants structured access to the same data sources so they can make informed dependency decisions.
Use OSV-Scanner in your CI pipeline. Use veripak (especially via MCP) when an AI agent or a human needs to evaluate whether a dependency is healthy, not just whether it has known vulnerabilities.
How it works
This section describes the internal architecture -- useful for contributors and anyone curious about what happens under the hood.
The CLI runs a parallel agent-based pipeline where LLM agents handle non-deterministic lookups (EOL reasoning, CVE triage, ecosystem inference) and deterministic checkers handle registry APIs:
+-------------------------+
| PACKAGE INPUT |
| name, versions_in_use, |
| urls, replacement_name |
+-----------+-------------+
|
+-----------v-------------+
| E0: ECOSYSTEM AGENT |
| |
| 1. LLM: "What is this?"|
| -> "java" (instant) |
| |
| 2. Validate: probe |
| Maven/PyPI/npm/etc |
| -> confirmed |
| |
| 3. If no hit: Tavily |
| search to confirm |
+-----------+-------------+
|
+-------------+-------------+
| FORK (parallel) |
| |
+--------v--------+ +------------v-----------+
| TRACK A | | TRACK B |
| | | |
| N1: VERSION | | EOL AGENT |
| (registry API) | | (single agentic loop) |
| | | | |
| v | | - Is version EOL? |
| N2: DOWNLOAD | | - Is project dead? |
| discovery | | - What's the |
| | | | replacement? |
| v | | |
| N3: DOWNLOAD | | |
| validation | +------------+-----------+
+--------+--------+ |
+-------------+-------------+
|
JOIN |
|
+-------------+-------------+
| FORK (parallel) |
| |
+--------v--------+ +------------v-----------+
| TRACK C | | TRACK D |
| | | |
| N5: REPLACEMENT| | CVE AGENT |
| VALIDATION | | (agentic loop) |
| (only if EOL | | |
| agent found | | Uses: version from |
| a replacement | | Track A, EOL status |
| to validate) | | from Track B |
+--------+--------+ +------------+-----------+
| |
+-------------+--------------+
|
JOIN |
|
+-----------v-------------+
| N6: SUMMARY AGENT |
| |
| All raw results + |
| deterministic guards + |
| HITL flags propagated |
+-----------+-------------+
|
+-----------v-------------+
| FINAL RESULT JSON |
+-------------------------+
Four specialized LLM agents (Ecosystem, EOL, CVE, Summary) enable reasoning about gaps and iterating on incomplete results. The agents use tools (registry probes, web search, GitHub API, advisory page fetching) and can flag fields for human review when data sources are inaccessible or signals are contradictory. Tracks A+B and C+D run in parallel via ThreadPoolExecutor.
MCP server path: When running as an MCP server (veripak serve), the LLM agents are bypassed entirely. The pipeline uses deterministic checkers only -- direct API calls to package registries, OSV.dev, NVD, and endoflife.date. The calling agent's LLM handles interpretation of the raw results.
Development
# Clone and install for development (includes MCP dependencies)
git clone https://github.com/rdwj/veripak.git
cd veripak
python -m venv .venv && source .venv/bin/activate
pip install -e ".[dev]"
# Run tests
pytest
# Run tests with coverage
pytest --cov=veripak --cov-report=term-missing
# Lint
ruff check src tests
# Build distribution
python -m build
Line length limit: 100 (ruff). Rule sets: E, W, F, I, B, C4, UP.
Changelog
0.3.0
- MCP server support (
veripak serve) with FastMCP v3 veripak --versionflag- Deterministic-only pipeline mode for MCP integration
- Environment variable support for API key configuration
- Data gap reporting in MCP responses
0.2.0
- Parallel agent-based pipeline (v2) replacing serial checker pipeline
- Token usage tracking and cost estimation
- Agent budget exhaustion handling
- EOL cross-pollination from EOL agent to version track
- Summary prompt refinements for accuracy
- Project automation: CLAUDE.md,
/create-releaseslash command,.claude/configuration
0.1.0
- Initial release with hybrid agent/checker architecture
- CLI with
veripak checkandveripak configcommands - Support for Ollama, Anthropic, OpenAI, and vLLM backends
- CI/CD pipeline with GitHub Actions and PyPI trusted publishing
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file veripak-0.4.0.tar.gz.
File metadata
- Download URL: veripak-0.4.0.tar.gz
- Upload date:
- Size: 83.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
69bedf87761afee955e912a4194313e26aa396307649e5b9d4f9f73ec7d283b3
|
|
| MD5 |
1f4b1d102e20e4c295720ba3928e3b5e
|
|
| BLAKE2b-256 |
cc5b97c8fbbc6b0062a3b0675fd6c3f0eb80fa34169017f4315827d05b4bd4a7
|
Provenance
The following attestation bundles were made for veripak-0.4.0.tar.gz:
Publisher:
release.yml on rdwj/veripak
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
veripak-0.4.0.tar.gz -
Subject digest:
69bedf87761afee955e912a4194313e26aa396307649e5b9d4f9f73ec7d283b3 - Sigstore transparency entry: 1202175152
- Sigstore integration time:
-
Permalink:
rdwj/veripak@666202f49fb60bfc0658d31f93e06f680be64c30 -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/rdwj
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@666202f49fb60bfc0658d31f93e06f680be64c30 -
Trigger Event:
push
-
Statement type:
File details
Details for the file veripak-0.4.0-py3-none-any.whl.
File metadata
- Download URL: veripak-0.4.0-py3-none-any.whl
- Upload date:
- Size: 78.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
f6761a16122bb42cb96cf51bd0162983437b4dab103b08798eebc52df00d2d22
|
|
| MD5 |
119c27733c539f48b5fd406c9bc79270
|
|
| BLAKE2b-256 |
e6a9e33c3fcf66f9cca7439ae5792c246bf328fdaa4674c8d784075a84c7550b
|
Provenance
The following attestation bundles were made for veripak-0.4.0-py3-none-any.whl:
Publisher:
release.yml on rdwj/veripak
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
veripak-0.4.0-py3-none-any.whl -
Subject digest:
f6761a16122bb42cb96cf51bd0162983437b4dab103b08798eebc52df00d2d22 - Sigstore transparency entry: 1202175164
- Sigstore integration time:
-
Permalink:
rdwj/veripak@666202f49fb60bfc0658d31f93e06f680be64c30 -
Branch / Tag:
refs/tags/v0.4.0 - Owner: https://github.com/rdwj
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
release.yml@666202f49fb60bfc0658d31f93e06f680be64c30 -
Trigger Event:
push
-
Statement type: