
Security News
Feross on TBPN: How North Korea Hijacked Axios
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.
@dependabit/action
Advanced tools
GitHub Action entry points for AI-powered dependency tracking.
This package provides the main entry points for the dependabit GitHub Actions, orchestrating all other packages to provide a complete dependency tracking solution using LLM-powered detection.
This package is distributed as part of the dependabit GitHub Action. See the main repository README for usage instructions.
Analyzes repository using LLM and generates .dependabit/manifest.json with detected dependencies.
Inputs:
github-token: GitHub token for API access (required)llm-provider: LLM provider (default: copilot)config-path: Path to config file (default: .dependabit/config.yml)Outputs:
manifest-path: Path to generated manifestdependencies-count: Number of dependencies detectedExample:
- uses: ./.github/actions/dependabit
with:
action: generate
github-token: ${{ secrets.GITHUB_TOKEN }}
Automatically updates manifest when code changes are pushed.
Triggers:
Example:
on:
push:
branches: [main]
jobs:
update-dependencies:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ./.github/actions/dependabit
with:
action: update
github-token: ${{ secrets.GITHUB_TOKEN }}
Periodically checks dependencies for changes and creates issues for updates.
Schedule: Configurable in .dependabit/config.yml (default: daily)
Features:
Example:
on:
schedule:
- cron: '0 0 * * *' # Daily at midnight
jobs:
check-dependencies:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- uses: ./.github/actions/dependabit
with:
action: check
github-token: ${{ secrets.GITHUB_TOKEN }}
Validates manifest file structure and content.
Checks:
Example:
- uses: ./.github/actions/dependabit
with:
action: validate
manifest-path: .dependabit/manifest.json
Supports multiple authentication methods:
- uses: ./.github/actions/dependabit
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
Configure in .dependabit/config.yml:
auth:
api.example.com:
secret: API_KEY
registry.example.com:
secret: REGISTRY_TOKEN
For npm publishing, use npm Trusted Publishers (OIDC) in GitHub Actions; no npm token is required.
Create .dependabit/config.yml:
version: "1.0"
schedule: "0 0 * * *" # Daily checks
llm:
provider: copilot
model: gpt-4
monitor:
check_interval: 24h
severity_threshold: minor
issues:
labels:
- dependency-update
- bot
assignees:
- maintainer-username
The action tracks performance metrics:
View metrics in action logs or enable detailed reporting:
- uses: ./.github/actions/dependabit
with:
action: check
enable-metrics: true
Errors are categorized with remediation steps:
Automatic warnings for large manifests:
Recommendations provided for size reduction.
# Install dependencies
pnpm install
# Build
pnpm build
# Run tests
pnpm test
# Type check
pnpm type-check
@dependabit/detector: LLM-based dependency detection@dependabit/manifest: Manifest schema and operations@dependabit/monitor: Change detection and monitoring@dependabit/github-client: GitHub API interactionsMIT
FAQs
GitHub Action entry points for dependency tracking
We found that @dependabit/action demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?

Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.

Security News
Socket CEO Feross Aboukhadijeh breaks down how North Korea hijacked Axios and what it means for the future of software supply chain security.

Security News
OpenSSF has issued a high-severity advisory warning open source developers of an active Slack-based campaign using impersonation to deliver malware.

Research
/Security News
Malicious packages published to npm, PyPI, Go Modules, crates.io, and Packagist impersonate developer tooling to fetch staged malware, steal credentials and wallets, and enable remote access.