aminet
v0.4.0
Published
CLI and GitHub Action for npm supply chain security reviews
Maintainers
Readme
aminet
aminet is a Node-executable CLI and GitHub Action for reviewing npm and Python dependency risk.
It analyzes dependency graphs, vulnerabilities, licenses, security signals, trust, freshness, provenance, and version pinning, then renders the result as terminal output, machine-readable JSON, SBOMs, or PR review comments.
Roadmap and 1.0 criteria live in ROADMAP.md.
Status
- Early project, pre-
1.0 - License: MIT
- CLI and review output may still evolve
- The intended
1.xguarantees are tracked inROADMAP.md
1.0 Target
Before 1.0, aminet is still allowed to refine CLI behavior and review presentation. The 1.0 target is to make the following contract explicit and stable:
- minimum workflows: npm
analyze/review, Pythonanalyzefor manifests and supported lockfiles, and Pythonreviewforrequirements.txt/pyproject.toml - compatibility surface: documented CLI flags, GitHub Action inputs, JSON fields, and the primary PR comment sections
- operational expectations: explicit messaging for best-effort resolution, skipped inputs, private registries, and degraded cache mode
- release gate: documentation, regression tests, and release notes stay aligned with shipped behavior
The longer checklist and post-1.0 candidates live in ROADMAP.md.
GitHub Action
The main distribution target is GitHub Actions. aminet is designed to review dependency changes in pull requests and post or update a focused review comment for npm and supported Python manifest workflows.
This repository ships a composite action in action.yml.
Use the released action from another repository:
name: Dependency review
on:
pull_request:
paths:
- "package.json"
- "pnpm-lock.yaml"
- "package-lock.json"
jobs:
aminet:
runs-on: ubuntu-latest
permissions:
contents: read
pull-requests: write
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: gorira-tatsu/[email protected]
with:
path: package.json
security: "true"This action is strongest when you want:
- PR comments focused on changed direct dependencies
- vulnerability, license, and supply chain checks during review
- one lightweight workflow step instead of custom shell glue
Common inputs:
path: manifest path, usuallypackage.json,requirements.txt, orpyproject.tomldepth: maximum dependency depth to resolvedev: include devDependencies in review (default:"true")deny-license: comma-separated SPDX IDs to blockfail-on-vuln: fail the job at or above a severity thresholdsecurity: enable deeper security checksversion: pin the publishedaminetCLI version explicitlycomment-id: override the stable PR comment identifier used for updates (default: manifest path)comment-prefix: override the human-readable label shown in the PR comment title (default: manifest path)lockfile-path: explicit path to lockfile (for monorepos, or to pinpyproject.tomlreview withpoetry.lock,pdm.lock, oruv.lock)exclude-packages: comma-separated packages to skip intentionally (supports wildcards like@scope/*)npm-token: npm auth token for private registries when private packages should be analyzed
Capability guide:
| Surface | Supported inputs |
|---------|------------------|
| analyze CLI | package.json, pnpm-lock.yaml, package-lock.json, bun.lock, requirements.txt, pyproject.toml, poetry.lock, pdm.lock, uv.lock |
| review CLI | package.json, requirements.txt, pyproject.toml |
| GitHub Action | wraps review; use path with package.json, requirements.txt, or pyproject.toml |
For Python projects, the Action does not accept standalone Python lockfiles through path. Use lockfile-path to pin a pyproject.toml review with poetry.lock, pdm.lock, or uv.lock.
For monorepo usage where package.json is in a sub-package:
- uses: gorira-tatsu/[email protected]
with:
path: packages/frontend/package.json
lockfile-path: pnpm-lock.yamlFor matrix-based monorepo review, each manifest can keep its own compact PR comment while remaining easy to identify:
strategy:
matrix:
path:
- package.json
- apps/backend/package.json
- apps/frontend/package.json
steps:
- uses: gorira-tatsu/[email protected]
with:
path: ${{ matrix.path }}
comment-prefix: ${{ matrix.path }}
security: "true"By default, aminet uses the manifest path as both the comment update key and the displayed label. Use comment-id only when you need to override the update key, and comment-prefix when you want a shorter or friendlier title while still showing the actual manifest path inside the comment body.
The review command automatically walks up parent directories to find lockfiles and reads the correct workspace section from pnpm lockfiles. Use lockfile-path when auto-detection does not work for your layout.
For Python review from a manifest:
- uses: gorira-tatsu/[email protected]
with:
path: pyproject.toml
lockfile-path: uv.lock
security: "true"For Python review from requirements.txt:
- uses: gorira-tatsu/[email protected]
with:
path: requirements.txt
security: "true"For repository-local usage during development:
jobs:
review:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
- uses: pnpm/action-setup@v4
- uses: actions/setup-node@v4
with:
node-version: "20"
- run: pnpm install --frozen-lockfile
- run: pnpm build
- uses: ./
with:
path: package.json
security: "true"If you want explicit version pinning instead of relying on the action tag:
- uses: gorira-tatsu/[email protected]
with:
version: "0.1.3"
path: package.json
fail-on-vuln: high
deny-license: GPL-3.0,AGPL-3.0If your project has private packages, choose one of these modes:
- authenticate private packages with
npm-token/NPM_TOKENwhen you want them included in analysis - skip internal packages with
exclude-packageswhen they should be intentionally out of scope - combine both when some private packages should be analyzed and others should be skipped
Action examples:
Authenticate private packages:
- uses: gorira-tatsu/[email protected]
with:
path: package.json
npm-token: ${{ secrets.NPM_TOKEN }}Skip internal packages intentionally:
- uses: gorira-tatsu/[email protected]
with:
path: package.json
exclude-packages: "@my-org/internal-*"Authenticate and skip selected packages:
- uses: gorira-tatsu/[email protected]
with:
path: package.json
npm-token: ${{ secrets.NPM_TOKEN }}
exclude-packages: "@my-org/internal-*"CLI
The CLI is still the underlying engine for local analysis, CI experiments, and debugging outside pull request workflows.
Install
Official distribution is through npmjs.org.
npx aminet --help
npm install -g aminet
pnpm add -g aminetQuick start
Analyze a published package:
npx aminet analyze [email protected] --security --trust-score --freshnessAnalyze a local project:
npx aminet analyze package.json --security --enhanced-license --jsonAnalyze Python dependencies:
npx aminet analyze requirements.txt
npx aminet analyze pyproject.toml
npx aminet analyze uv.lock
npx aminet analyze requests --ecosystem pypiReview dependency changes in a branch (includes devDependencies by default):
npx aminet review package.json --base HEAD~1 --security
npx aminet review package.json --base HEAD~1 --no-dev # exclude devDependencies
npx aminet review requirements.txt --base HEAD~1 --security
npx aminet review pyproject.toml --base HEAD~1 --lockfile-path uv.lockCapability summary:
analyzeaccepts standalone Python lockfiles (poetry.lock,pdm.lock,uv.lock) and reads the adjacentpyproject.toml.reviewacceptsrequirements.txtandpyproject.toml, not standalone Python lockfiles.- the GitHub Action wraps
review, so Python lockfiles are passed throughlockfile-pathrather thanpath.
Review with private packages:
NPM_TOKEN=xxx npx aminet review package.json --base HEAD~1
npx aminet review package.json --base HEAD~1 --exclude-packages "@scope/*"
NPM_TOKEN=xxx npx aminet review package.json --base HEAD~1 --exclude-packages "@scope/internal-*"Generate a config file interactively:
npx aminet init # interactive prompts
npx aminet init --defaults # non-interactive with sensible defaults
npx aminet init --defaults --merge # merge defaults into existing config
npx aminet init --defaults --force # overwrite existing configinit does not embed private registry secrets by default. Use NPM_TOKEN in the environment when private packages should be analyzed, or excludePackages when internal packages should be skipped instead.
Cache maintenance:
npx aminet cache stats
npx aminet cache pruneIf native SQLite bindings are unavailable, analyze and review still run, but aminet disables DB-backed caching in that environment. aminet cache ... subcommands still require the on-disk database and will exit non-zero until persistent cache support is available.
CLI commands
Top-level commands:
analyze: dependency graph analysis for packages or local manifestsci: JSON-oriented CI alias foranalyzereview: PR review mode for direct dependency changesinit: generateaminet.config.jsoninteractivelycache: local cache inspection and pruning
Use the built-in help for the complete option set:
npx aminet analyze --help
npx aminet review --helpConfiguration
Place an aminet.config.json in your project root to set defaults:
{
"excludePackages": ["@my-org/*", "@internal/legacy-lib"],
"npmToken": "npm_...",
"denyLicenses": ["GPL-3.0", "AGPL-3.0"],
"allowLicenses": ["MIT", "ISC", "Apache-2.0"],
"depth": 5,
"concurrency": 5,
"security": true,
"deepLicenseCheck": false
}All fields are optional. CLI flags and Action inputs override config file values. For npmToken, the resolution order is: CLI --npm-token > NPM_TOKEN environment variable > config file.
What aminet does
- Analyze a package or project dependency graph
- Review pull request dependency changes and post GitHub comments
- Flag vulnerability, license, and supply chain concerns
- Generate SPDX and CycloneDX SBOM output
- Produce third-party notices output
Feature overview
- Vulnerability scanning via OSV, GHSA, and npm audit
- License categorization, deny-list checks, compatibility checks, and deep tarball license verification
- Enhanced license intelligence via ClearlyDefined
- Trust scoring from packument data, downloads, and deps.dev metadata
- Freshness analysis for outdated or abandoned dependencies
- Provenance checks for npm attestations
- Phantom dependency detection
- Version pinning analysis
- PR review comments focused on changed direct dependencies
Example outputs
Representative analyze modes:
npx aminet analyze [email protected] --json
npx aminet analyze [email protected] --cyclonedx
npx aminet analyze [email protected] --spdx
npx aminet analyze [email protected] --noticesRepresentative review mode:
## aminet Dependency Review — `apps/frontend/package.json`
Target: `apps/frontend/package.json`
**Summary**: 1 updated dependency, 2 new vulnerabilities, 1 license change
**Risk Level**: :red_circle: Critical
### Key Alerts
- 2 critical/high vulnerability alerts introduced
- 1 dependency license alerts require review
<details>
<summary>Detailed review</summary>
| Metric | Count |
|--------|-------|
| Added | 0 |
| Removed | 0 |
| Updated | 1 |
| New Vulnerabilities | 2 |
| Resolved Vulnerabilities | 1 |
| New Security Signals | 1 |
| Resolved Security Signals | 0 |
| License Changes | 1 |
### New Vulnerabilities
| Package | Version | Severity | Advisory | Fixed | Source | Summary |
|---------|---------|----------|----------|-------|--------|---------|
| minimist | 1.2.8 | CRITICAL | GHSA-... | 1.2.6 | osv | Prototype Pollution |
</details>Output modes
analyze can render:
- human-readable table output
- JSON
- dependency tree output
- Mermaid and Graphviz graphs
- CycloneDX 1.5 SBOM
- SPDX 2.3 SBOM
- third-party notices output
Python support (experimental)
aminet can analyze Python dependencies from requirements.txt and pyproject.toml files. The ecosystem is auto-detected from the file name, or you can pass --ecosystem pypi explicitly.
Supported input formats:
requirements.txtwith pinned (==) or range specifierspyproject.tomlwith these supported scopes:- PEP 621
[project].dependencies [project.optional-dependencies]for dev-like groups:dev,test,tests,docs,doc,lint,typing,typecheck[dependency-groups]for the same dev-like groups, includinginclude-group- Poetry
[tool.poetry.dependencies],[tool.poetry.dev-dependencies], and[tool.poetry.group.<name>.dependencies]
- PEP 621
poetry.lock,pdm.lock, anduv.lockforanalyze
| Input | analyze | review | GitHub Action |
|-------|-----------|----------|---------------|
| requirements.txt | supported | supported | supported through path |
| pyproject.toml | supported | supported | supported through path |
| poetry.lock | supported | not a standalone input | use through lockfile-path with pyproject.toml |
| pdm.lock | supported | not a standalone input | use through lockfile-path with pyproject.toml |
| uv.lock | supported | not a standalone input | use through lockfile-path with pyproject.toml |
Limitations:
- Pinned versions (
==) are scanned accurately. Range specifiers resolve to the latest compatible version from PyPI, which may not match your actual environment. These are marked as best-effort in the analysis. - Dependencies with environment markers (e.g.,
; python_version < '3.8') are skipped with a warning. - Poetry dependencies without a version-bearing specifier, such as local
pathorgitsources, are currently out of scope forpyproject.tomlparsing. requirements.txtdirectives such as-r,-e, and--index-urlare ignored and surfaced as analysis/review notes instead of being treated as package dependencies.- Python lockfiles are analyze-first inputs, not standalone
reviewinputs. reviewsupportsrequirements.txtandpyproject.toml. When apyproject.tomlreview has an adjacent or explicit Python lockfile, aminet uses it to pin direct dependency versions where possible.- The GitHub Action wraps
review, so Python lockfiles are passed throughlockfile-pathinstead ofpath.
For the longer-term compatibility target, see ROADMAP.md.
Requirements
- Node.js
>=20 - pnpm
>=10 - npm ecosystem input (
package.json,pnpm-lock.yaml, orpackage-lock.json) or Python input (requirements.txt,pyproject.toml)
Local setup
pnpm install
pnpm build
node dist/index.js --helpReleasing
The intended release flow is tag-driven with npm trusted publishing.
- Update
package.jsonto the release version - Commit and push
main - Create and push a
v<version>tag - GitHub Actions publishes the matching npm package and creates a GitHub Release
You can also run the publish workflow manually with workflow_dispatch against a branch or tag. When you provide tag_name, it must still match package.json.
One-time prerequisite: configure npm trusted publishing for gorira-tatsu/aminet and the publish workflow in npm package settings.
Distribution
- npmjs.org is the canonical package registry for
aminet - GitHub Releases are the canonical release log and link back to npm
- GitHub Packages is intentionally not used for now
Development workflow
Run the main checks before opening a PR:
pnpm lint
pnpm testSee CONTRIBUTING.md for contributor workflow details.
Packaging notes
The published package exposes an aminet executable through dist/index.js with a Node shebang.
npx aminet ...is the recommended zero-install UXpnpm dlx aminet ...works, but may run with cache disabled when native SQLite bindings are unavailablepnpm add -g aminetexposesaminet ...globally- repository-local development can use
node dist/index.js ...afterpnpm build
Security reporting
Do not report vulnerabilities in public issues. See SECURITY.md.
