Awesome Open Source
Awesome Open Source


Travis CI GitHub Issues License Latest Version

Shim to easily install the OWASP dependency-check-cli tool into Python projects.



dependency-check scans application dependencies and checks whether they contain any published vulnerabilities (based on the NIST NVD). It runs in the JVM, so you need some form of java available in your PATH. The script should work on Linux, Mac OSX and Windows, but right now is only tested on Linux.


After installation, you'll have the dependency-check command available that, on first use, will automatically download and install the OWASP release archive once for all projects. It'll then redirect any calls to that installation, meaning the downloaded NVD data is shared amongst projects.

dependency-check --disableAssembly -s . -o build --project "$(python ./ --name)" \
    --exclude ".git/**" --exclude ".venv/**" --exclude "**/__pycache__/**" --exclude ".tox/**" \
    && xdg-open build/dependency-check-report.html

Please see the DependencyCheck site for more configuration and usage details.

To install from PyPI, add dependency-check to your dev-requirements.txt or a similar file. For more installation options, see the Installation section below.

Installation Demo


Using environment variables, you can change the version and download location of the release archive, and the directory for the local installation.

Variable Default
DEPENDENCY_CHECK_HOME ~/.local/dependency-check

To update to a new version of the OWASP software, delete ~/.local/dependency-check/bin/, set DEPENDENCY_CHECK_VERSION to the new version number, and call dependency-check.

The variable DEPENDENCY_CHECK_NVD_URL can be used to point to a local copy of the various NVD feeds, in a flat hierarchy with compressed JSON files.

export DEPENDENCY_CHECK_NVD_URL='https://repo.local/nvd/nvdcve-1.1-%d.json.gz'

If you set this, the options --cveUrlBase and --cveUrlModified will be added to each call. Note that the %d representing the year is replaced by modified for the latter.

Remove the ~/.local/dependency-check/data/ directory to force a full data reload.


To just get the dependency-check CLI tool installed into your home, independent of any project, call python3 -m pip install --user dependency-check as usual, see releases for an overview of available versions.

If you prefer an isolated and easily removable venv installation, consider using dephell jail install dependency-check instead.

To get a bleeding-edge version from source, use these commands:

python3 -m pip install -r "$repo/master/requirements.txt"
python3 -m pip install "$repo/archive/"

As a developer, to create a working directory for this project, call these commands:

git clone ""
cd "dependency-check-py"
command . .env --yes --develop
invoke build --docs test check

You might also need to follow some setup procedures to make the necessary basic commands available on Linux, Mac OS X, and Windows.

Other Python Security Tools

  • openstack/bandit Security linter designed to find common security issues in Python code, by static AST analysis.
  • pyupio/safety Safety checks your installed dependencies for known security vulnerabilities.
    • pyupio/safety-db A curated database of security vulnerabilities in Python packages.
  • eliasgranderubio/dagda Static analysis of known vulnerabilities, trojans, viruses, malware & other malicious threats in Docker images, and runtime monitoring of containers for anomalous activities.
  • anchore/anchore-engine A service for inspection, analysis and certification of container images, provided as a ready-to-deploy Docker container image.
  • sonatype-nexus-community/jake An OSS Index integration to check your Conda environments for vulnerable Open Source packages.
  • vintasoftware/python-linters-and-code-analysis Curated list of Python linters and code analysis tools.

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Python (1,137,610
Security (8,706
Security Audit (389
Owasp (319
Vulnerability Detection (177
Related Projects