Audit context
Use package-manager audit results, but review them alongside usage, depth, package source, and execution surface.
Security review
npm audit is useful, but it does not show the full dependency review surface: install scripts, native bindings, executable bins, unusual sources, local execution signals, and package context.
npx dependency-radarWhat it helps with
Dependency Radar runs against your installed JavaScript or TypeScript project and produces a self-contained report. Registry backed audit, outdated, signature, or enrichment checks need registry access unless you run with --offline.
Use package-manager audit results, but review them alongside usage, depth, package source, and execution surface.
Surface lifecycle scripts, executable bins, native bindings, .node binaries, and binding.gyp files.
Flag git, file, tarball, missing-integrity, and unexpected-registry dependency sources.
Review bundled dependencies, embedded npm-shrinkwrap.json files, and package metadata that deserves attention.
Emit SARIF for security tooling and CI workflows without needing a hosted scanner.
Run with --offline when you want a scan that avoids package registry calls.
Baseline
npm audit is useful for known vulnerability advisories. It gives you a baseline for CVE-style risk and should stay part of the review process.
Coverage
Dependency security review also needs to look at how packages install, where they came from, and what local package signals deserve human attention.
Signals
Dependency Radar does not prove a package is safe and does not claim to detect malware. It highlights review signals that normal vulnerability checks can miss.
Workflow
Dependency Radar is a dependency review tool, not a replacement for security scanners, code review, or incident response tooling.
Try it
Start with the standard scan when registry-backed advisories are useful, or use --offline when you want a no-registry-call first look.
npx dependency-radar