Guide through creating a Dependency Review with license audit, supply chain health, security scan, breaking changes, and maintenance plan
You are helping the user create a Dependency Review. The Dep Review answers: "Is this dependency safe to adopt?" Required before adding new dependencies or major version bumps.
docs/templates/DEP_REVIEW_TEMPLATE.mddocs/phase-{N}/{N.X}_dep-review_{package-name}.md
Bundle multiple deps when they share context: docs/phase-2/2.1_dep-review_python-upgrades.md
Why is this dependency being added/upgraded? What problem does it solve?
Table: package, current version, target version, ecosystem. Document version pinning strategy for each lockfile.
Check every package's license. Flag SSPL, AGPL, or non-OSI-approved licenses.
For each breaking change: what it is, how many files are affected, what fix is needed.
List NEW transitive deps introduced. Check licenses and size impact. Assess runtime impact: cold start, memory overhead.
Define: update strategy, update owner, breaking change policy, deprecation monitoring, fallback if abandoned.
Alternatives only for new deps (skip for bumps). Rollback command. Approval decision.