Tame the Dependabot PR flood — auto-merge the safe ones, flag the risky ones
Reviews dependency update PRs by reading changelogs, checking for breaking changes, running tests, and auto-merging patch updates that pass CI. Turns 50 Dependabot PRs per week into 3 that need your attention.
Create a skill called "Dep Wrangler". Help me manage the flood of dependency update PRs (Dependabot, Renovate, or manual): For each open dependency update PR: 1. Read the changelog/release notes for the new version 2. Classify the update: security fix, breaking change, new feature, or patch 3. Check if CI passes 4. For security updates, look up the CVE and EPSS score 5. Recommend action: auto-merge, review needed, or defer Auto-merge criteria (configurable): - Patch version bump + CI passes + no breaking changes in changelog - Security patches regardless of version bump Generate a weekly summary: what was merged, what needs review, what security updates are outstanding. Group related updates where possible.
Instead of ignoring 200 Dependabot PRs or rubber-stamping them, this skill
triages each update by actual risk: read the changelog, check the version
bump type, run tests, and decide.
Separate the 5 exploitable CVEs from the 500 that don't matter
Runs container and dependency scans, then triages the results by actual risk — not just CVSS score. Cross-references EPSS (exploit probability), KEV catalog (known exploited), and reachability analysis to surface what actually needs fixing today.
Generate SOC2 evidence in minutes, not weeks
Runs infrastructure compliance checks using open-source tools (checkov, tfsec, kube-bench, prowler) and generates formatted evidence mapped to compliance framework controls. Turns weeks of screenshot-taking into an automated evidence package.
A calm checklist when fraud hits
Immediate steps, reporting sequences, and long-term hardening for scams and identity theft. Organized by urgency so you know what to do first.
Verify brand offers before you click anything
Screens incoming partnership offers for phishing and scam patterns: suspicious domains, attachments, fake checks, requests to "connect your account," and vague contracts. Outputs a risk rating and safe verification steps.