Vulnerability scanner for Python dependencies using the OSV API
Project description
pyvulscan
Vulnerability scanner for Python dependencies using the OSV API.
Supports uv.lock, poetry.lock, pyproject.toml, and requirements.txt — no environment activation needed.
Install
pip install pyvulscan
# or with uv tool
uv tool install pyvulscan
# or with pipx
pipx install pyvulscan
Usage
Single project
# Auto-detect lockfile in current project
pyvulscan pyproject.toml
# Scan a specific lockfile
pyvulscan uv.lock
pyvulscan poetry.lock
# Scan only direct dependencies (not transitive)
pyvulscan pyproject.toml --direct-only
# Include dev dependencies (Poetry only)
pyvulscan pyproject.toml --group main --group dev
# JSON output (for CI/CD integration)
pyvulscan pyproject.toml --json
# Exit with code 1 if vulnerabilities found (CI gate)
pyvulscan pyproject.toml --exit-code
# Add a filtered summary section at the end (HIGH and CRITICAL only)
pyvulscan pyproject.toml --filter HIGH
# Filter from MEDIUM and above
pyvulscan pyproject.toml --filter MEDIUM
# Check if suggested fix versions resolve without conflicts (dry-run, no files modified)
pyvulscan uv.lock --fix-dry-run
Multiple projects (multiscan)
Scan several projects at once from a config file. All projects are scanned in parallel and findings are grouped by project in the report.
pyvulscan multiscan projects.json
pyvulscan multiscan projects.yaml
pyvulscan multiscan projects.py
# JSON output
pyvulscan multiscan projects.json --json
# CI gate: exit 1 if any project has vulnerabilities
pyvulscan multiscan projects.json --exit-code
# Add a filtered summary section grouped by project (HIGH and CRITICAL only)
pyvulscan multiscan projects.json --filter HIGH
Config file formats
All formats accept a simple list of paths or a list of objects with path and an optional name.
JSON (projects.json):
{
"projects": [
{ "path": "~/code/api", "name": "API" },
{ "path": "~/code/workers" }
]
}
YAML (projects.yaml) — requires pip install pyyaml:
projects:
- path: ~/code/api
name: API
- path: ~/code/workers
Python (projects.py):
projects = [
{"path": "~/code/api", "name": "API"},
{"path": "~/code/workers"},
]
Example files are available in the repository root: multiscan.example.json, multiscan.example.yaml, multiscan.example.py.
Severity filter
The --filter LEVEL option appends a dedicated section at the end of the report listing only findings at or above the chosen severity. The full report is always shown — the filter section is additive.
Accepted levels (from lowest to highest): LOW, MEDIUM, HIGH, CRITICAL.
Without --filter, the section is omitted. Works in both single-project and multiscan modes; in multiscan, findings are grouped by project inside the filter section.
Fix dry-run
The --fix-dry-run flag tests whether the suggested fix versions can be applied without dependency conflicts — no files are modified.
For each vulnerability found, it:
- Selects the lowest fix version higher than the currently installed version
- Runs
uv pip install <package>==<fix_version> --dry-run(orpoetry add/pip installdepending on the project) - Reports whether the resolution succeeds or produces a conflict
════════════════════════════════════════════════════════════
pyau — Fix Dry-run Report
════════════════════════════════════════════════════════════
Packages checked : 1
Resolves cleanly : 1
Conflicts : 0
No fix available : 0
════════════════════════════════════════════════════════════
cryptography → 46.0.7 ✅ resolves cleanly
Applying the fix (editing
pyproject.toml/ lockfile) is planned for a future--fix-applyflag.
How it works
- Parses your lockfile to get exact resolved versions
- Sends a single batch request to the OSV API
- Fetches full details (severity, fix version) for each vulnerability found in parallel
- Reports findings with CVSS score, label, and recommended fix version
In multiscan mode, all projects are also scanned in parallel.
MCP Server
pyvulscan includes an MCP (Model Context Protocol) server that lets Claude Code scan for vulnerabilities directly, without leaving the chat.
Install with MCP support
pip install pyvulscan[mcp]
# or with pipx
pipx install pyvulscan[mcp]
# or with uv
uv tool install pyvulscan[mcp]
Configure Claude Code
Project-level — create .mcp.json in your project root (recommended):
{
"mcpServers": {
"pyvulscan": {
"command": "pyvulscan-mcp"
}
}
}
Global CLI — add once and use across all projects:
claude mcp add pyvulscan pyvulscan-mcp
Claude Desktop — edit ~/.config/claude/claude_desktop_config.json (macOS/Linux) or %APPDATA%\Claude\claude_desktop_config.json (Windows):
{
"mcpServers": {
"pyvulscan": {
"command": "pyvulscan-mcp"
}
}
}
Without installing — use uvx:
{
"mcpServers": {
"pyvulscan": {
"command": "uvx",
"args": ["--from", "pyvulscan[mcp]", "pyvulscan-mcp"]
}
}
}
Restart Claude Code after any config change.
Available tools
| Tool | Description |
|---|---|
scan_vulnerabilities |
Scan a specific dependency file (uv.lock, poetry.lock, pyproject.toml, requirements.txt) |
scan_directory |
Auto-detect and scan all dependency files in a directory |
check_package |
Check a specific package by name — auto-detects the version from the project if not provided |
Example prompts:
Scan my current project for vulnerabilities
Check if the requests package has any known vulnerabilities
Scan the file requirements.txt in /path/to/project
Response format
All tools return JSON:
{
"success": true,
"packages_scanned": 10,
"vulnerabilities_found": 2,
"findings": [
{
"package": "django",
"version": "3.2.0",
"vuln_id": "GHSA-xxxx-xxxx-xxxx",
"aliases": ["CVE-2023-12345"],
"summary": "Description of the vulnerability",
"severity": { "score": 7.5, "label": "HIGH", "type": "CVSS:3.1" },
"fixed_versions": ["3.2.19", "4.1.8"]
}
]
}
Troubleshooting
- Server not appearing — verify the config file syntax and restart Claude Code completely.
- Command not found — confirm the package is installed (
pip list | grep pyvulscan) or switch to theuvxoption. - Logs — Claude Code stores MCP logs at
~/.config/claude/logs/(macOS/Linux) or%APPDATA%\Claude\logs\(Windows).
Development
# Install with dev dependencies
pip install -e ".[dev]"
# Run tests
pytest tests/
# Lint
ruff check src/
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file pyvulscan-0.1.9.tar.gz.
File metadata
- Download URL: pyvulscan-0.1.9.tar.gz
- Upload date:
- Size: 144.0 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.11.13 {"installer":{"name":"uv","version":"0.11.13","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
631056a949356f7106bc5cce56525ae9aa960b3c74a4fb33fbb3f1fb5eb4ac16
|
|
| MD5 |
79e15af70db25965907db596d0cb0ce1
|
|
| BLAKE2b-256 |
76cc16f63909e0bfb222bdbbe8df32a88cb5a84f254e7726cd8fdef43988ee39
|
File details
Details for the file pyvulscan-0.1.9-py3-none-any.whl.
File metadata
- Download URL: pyvulscan-0.1.9-py3-none-any.whl
- Upload date:
- Size: 23.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.11.13 {"installer":{"name":"uv","version":"0.11.13","subcommand":["publish"]},"python":null,"implementation":{"name":null,"version":null},"distro":{"name":"Ubuntu","version":"24.04","id":"noble","libc":null},"system":{"name":null,"release":null},"cpu":null,"openssl_version":null,"setuptools_version":null,"rustc_version":null,"ci":true}
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
080ebc3b7e9d743280ef9fa8033dc5c25d4462b3eb1e175b2cbb0dc4e0b4ff4e
|
|
| MD5 |
28f5a55b08ecd03d3c7d0921162a00de
|
|
| BLAKE2b-256 |
85b75a36bb4f32784044cc6f0bd5083140054bf571abad5cfe743fdc81454b63
|