Lightweight Python Dependency Vulnerability Lookup Tool Built With An Agentic Coding Workflow
Sources: 1 • Confidence: Medium • Updated: 2026-04-13 03:54
Key takeaways
- An HTML tool was built using Claude Code to look up Python dependency vulnerabilities via the OSV.dev API.
- OSV.dev provides an open, CORS-enabled JSON API for its open source vulnerability database.
- The tool accepts pasted pyproject.toml or requirements.txt content, or a GitHub repository name containing those files, and returns a list of vulnerabilities reported by the OSV.dev API.
Sections
Lightweight Python Dependency Vulnerability Lookup Tool Built With An Agentic Coding Workflow
- An HTML tool was built using Claude Code to look up Python dependency vulnerabilities via the OSV.dev API.
- The tool accepts pasted pyproject.toml or requirements.txt content, or a GitHub repository name containing those files, and returns a list of vulnerabilities reported by the OSV.dev API.
Browser-Accessible Vulnerability Data Via Osv.Dev
- OSV.dev provides an open, CORS-enabled JSON API for its open source vulnerability database.
Unknowns
- What are the OSV.dev API rate limits, availability guarantees, and any usage constraints that would affect sustained or automated use?
- Does the tool resolve dependency versions accurately (including ranges) and how does it handle transitive dependencies versus only direct dependencies?
- How does the tool authenticate to GitHub (if at all), and how does it behave under GitHub API limits or private repository access constraints?
- What is the validation approach for the returned vulnerability list (for example, mapping correctness between packages/versions and OSV entries) and what are the expected false positive/negative modes?
- What privacy and data-handling properties does the tool have when users paste dependency files, and is any data persisted or logged?