DEP-002 recommended dependency-management
Dependency update system configured
Dependabot, Renovate, or documented manual process for tracking updates
Question to ask
"Who's watching for new vulnerabilities — a person or a bot?"
Verification guide
Severity: Recommended
Check automatically:
Look for Dependabot config:
ls -la .github/dependabot.yml .github/dependabot.yaml 2>/dev/nullLook for Renovate config:
ls -la renovate.json renovate.json5 .renovaterc .renovaterc.json .github/renovate.json 2>/dev/nullIf found, verify config covers the project:
# Check Dependabot covers the right ecosystem cat .github/dependabot.yml 2>/dev/null | grep -E "package-ecosystem|directory" # Check Renovate is enabled cat renovate.json 2>/dev/nullCheck for recent dependency update PRs (evidence it's working):
gh pr list --state all --limit 20 --json title,createdAt | grep -iE "(dependabot|renovate|bump|update.*dependencies)"
Cross-reference with:
- DEP-001: If lockfile is fresh and no vulnerabilities, the system is likely working
Pass criteria:
- Dependabot or Renovate configured, OR
- Evidence of regular manual dependency updates (recent PRs, fresh lockfile)
Fail criteria:
- No automated system AND no evidence of manual updates
- Config exists but is broken/incomplete (wrong ecosystem, wrong directory)
If no config found, ask user: "No Dependabot or Renovate config found. How are dependency updates tracked? Is there a manual process?"
Evidence to capture:
- Which system configured (Dependabot/Renovate/manual)
- Config file location
- Recent dependency update PRs (last 3 months)