Plan and apply Go dependency updates, including advisory-driven bumps, Trivy/govulncheck validation, and supply-chain review. Use when the user asks to update dependencies, refresh modules for security alerts, or run dependency vulnerability scans.
Use this skill when the user wants to update dependencies in this repo—whether driven by security advisories, Dependabot, or general maintenance.
This repository is primarily Go (go.mod / go.sum). There is no root Node workspace; follow the Go workflow below.
Project convention: Do not create or maintain docs/vuln-residual-risk.md (or similar residual-risk documents) unless the user explicitly asks. Summarize anything still open in the PR description or chat instead.
docker run --rm -v "$PWD:/src" -w /src aquasec/trivy@sha256:bcc376de8d77cfe086a917230e818dc9f8528e3c852f7b1aff648949b6258d1c fs --scanners vuln .
go install golang.org/x/vuln/cmd/govulncheck@latest
govulncheck ./...
gh against the upstream repo when helpful, for example Dependabot security alerts:gh api repos/trufflesecurity/trufflehog/dependabot/alerts --paginate
Actionable: a fixed version exists and the current constraint allows, or can be relaxed to allow, the update.Blocked: a fix exists, but taking it would require a major-version bump in a sibling dependency or a broader refactor the user did not ask for.No fix available: upstream has not published a patched release.go.mod / go.sum edits in a single coordinating agent.Use this path for findings in go.mod or go.sum.
go get example.com/[email protected] (or a compatible minor/patch as appropriate).go mod tidy from the project root.go.sum manually; it is generated.make lint (or ./scripts/lint.sh) to match CI’s golangci-lint configuration.make test for the default unit test sweep, orgo test -timeout 30s -tags "integration detectors" ./... when exercising integration and detector-tagged packages (narrow the path when only specific packages changed).make test-integration or make test-detectors when the change touches integration-only or detector code paths.After making updates:
govulncheck ./... if you use it in this pass.make lint and the relevant go test / make test* targets for the areas you touched.go.sum manually; regenerate with go mod tidy after go get / go mod changes.go.mod and go.sum edits under one coordinating agent.