Dependency Update Monitor
Monitor dependencies for updates and vulnerabilities, auto-create PRs with changelogs
🧂 Ingredients
🔌 APIs
repository_access_create_branches_and_prs_for_updates
🔄 Alternatives:
check_latest_package_versions_and_changelogs
🔄 Alternatives:
vulnerability_database_for_security_scanning
🔄 Alternatives:
alert_on_critical_vulnerabilities
🔄 Alternatives:
📋 Step-by-Step Build Guide
Clone or access your repo and parse package.json / requirements.txt for current
1. Clone or access your repo and parse package.json / requirements.txt for current dependency versions
Clone or access your repo and parse package.json / requirements.txt for current dependency versions Steps: 1. Validate all required inputs are available 2. Execute the operation described above 3. Verify the result meets expected output format 4. Handle errors gracefully — retry transient failures, log and alert on persistent ones 5. Return structured output with status and any relevant data If any required data is missing, request it from the user before proceeding.
Check npm registry (or PyPI) for latest versions of each dependency
2. Check npm registry (or PyPI) for latest versions of each dependency
Check npm registry (or PyPI) for latest versions of each dependency Steps: 1. Validate all required inputs are available 2. Execute the operation described above 3. Verify the result meets expected output format 4. Handle errors gracefully — retry transient failures, log and alert on persistent ones 5. Return structured output with status and any relevant data If any required data is missing, request it from the user before proceeding.
Identify outdated packages
3. Identify outdated packages: patch updates, minor updates, and major (breaking) updates
Identify outdated packages: patch updates, minor updates, and major (breaking) updates Steps: 1. Validate all required inputs are available 2. Execute the operation described above 3. Verify the result meets expected output format 4. Handle errors gracefully — retry transient failures, log and alert on persistent ones 5. Return structured output with status and any relevant data If any required data is missing, request it from the user before proceeding.
Run npm audit or check Snyk for known vulnerabilities in current versions
4. Run npm audit or check Snyk for known vulnerabilities in current versions
Run npm audit or check Snyk for known vulnerabilities in current versions Steps: 1. Validate all required inputs are available 2. Execute the operation described above 3. Verify the result meets expected output format 4. Handle errors gracefully — retry transient failures, log and alert on persistent ones 5. Return structured output with status and any relevant data If any required data is missing, request it from the user before proceeding.
For each outdated package, pull the changelog and summarize what changed (especi
5. For each outdated package, pull the changelog and summarize what changed (especially breaking changes)
For each outdated package, pull the changelog and summarize what changed (especially breaking changes) Steps: 1. Validate all required inputs are available 2. Execute the operation described above 3. Verify the result meets expected output format 4. Handle errors gracefully — retry transient failures, log and alert on persistent ones 5. Return structured output with status and any relevant data If any required data is missing, request it from the user before proceeding.
Prioritize
6. Prioritize: critical security fixes > major updates with breaking changes > minor updates > patch updates
Analyze the input and classify it into the defined categories.
Classification approach:
1. Extract key signals from the content (keywords, sender, urgency markers, topic)
2. Match against category definitions
3. Assign confidence score (high/medium/low)
4. For ambiguous cases, classify as the more important/urgent category (err on the side of caution)
Output for each item: { category, priority, confidence, reasoning }
If an item could belong to multiple categories, pick the primary one and note the secondary.Create a PR for high
7. Create a PR for high-priority updates with: version bump, changelog summary, and any migration notes
Compile the gathered data into a structured report. Format as clean Markdown with: - Title/date header - Executive summary (2-3 sentences) - Key metrics section with actual numbers - Detailed sections with bullet points - Action items or recommendations at the end Keep it scannable — busy people read reports in 30 seconds. Use emoji sparingly for visual anchors (📊 metrics, ✅ wins, ⚠️ concerns, 📋 action items). Include data comparisons: "X this period vs Y last period (↑Z%)" If any data source was unavailable, note it clearly: "⚠️ [Source] data unavailable — excluded from this report."
Weekly report
8. Weekly report: outdated packages, vulnerability count by severity, PRs created, and recommended actions
Compile the gathered data into a structured report. Format as clean Markdown with: - Title/date header - Executive summary (2-3 sentences) - Key metrics section with actual numbers - Detailed sections with bullet points - Action items or recommendations at the end Keep it scannable — busy people read reports in 30 seconds. Use emoji sparingly for visual anchors (📊 metrics, ✅ wins, ⚠️ concerns, 📋 action items). Include data comparisons: "X this period vs Y last period (↑Z%)" If any data source was unavailable, note it clearly: "⚠️ [Source] data unavailable — excluded from this report."
🤖 Example Agent Prompt
Clone or access your repo and parse package.json / requirements.txt for current dependency versions Steps: 1. Validate all required inputs are available 2. Execute the operation described above 3. Verify the result meets expected output format 4. Handle errors gracefully — retry transient failures, log and alert on persistent ones 5. Return structured output with status and any relevant data If any required data is missing, request it from the user before proceeding.
Copy this prompt into your agent to get started.