Loading...
Loading...
Run Confused and GuardDog to detect dependency confusion and typosquatting risks. Checks if internal package names exist on public registries and identifies malicious packages.
npx skill4agent add vchirrav/owasp-secure-coding-md dependency-confusion-detectgo install github.com/nickvdyck/confused@latestpip install guarddogconfused --helpguarddog --version# npm
confused -l npm package.json
# Python
confused -l pip requirements.txt
# Maven
confused -l mvn pom.xml| # | Package | Private/Internal | Exists on Public Registry | Risk |
|---|---------|-----------------|--------------------------|------|# Scan specific package
guarddog pypi scan <package-name>
guarddog npm scan <package-name>
# Verify entire requirements file
guarddog pypi verify requirements.txt
guarddog npm verify package.json| # | Package | Indicator | Severity | Description |
|---|---------|-----------|----------|-------------|| Indicator | Description |
|---|---|
| Install scripts | Code runs during |
| Network calls | Package phones home during install |
| Obfuscation | Base64/hex encoded payloads |
| Typosquatting | Name similar to popular packages |
| Exfiltration | Reads env vars, SSH keys, or credentials |
| Dependency confusion | Internal name published to public registry |