Enterprise Dependency Governance

Stop vulnerable packages before they ship.

Dependo gates your dependencies at the CI/CD level. Automated vulnerability scanning, signature verification, license compliance, maintainer trust analysis, and SBOM generation—powered by 19 background workers for enterprise-scale throughput.

10 Package ecosystems
2 SBOM formats
<5s Verification time
dependo verify
$ dependo verify --manifest package-lock.json
Analyzing 247 packages...
Vulnerability scan complete (NVD + GHSA)
Signature verification passed
License compliance verified
SBOM generated (CycloneDX 1.5)
! 2 packages require approval
Status: RequiresApproval
Critical: 0
High: 0
Medium: 2
Blocked: lodash@4.17.20, moment@2.29.1
Scroll
0K
Packages Analyzed
0K
CVEs Detected
0.9%
Uptime SLA
<0s
Avg Response

Protecting dependencies across modern development stacks

Everything you need to
secure your supply chain

From vulnerability scanning to SBOM generation, Dependo provides comprehensive dependency governance for enterprise teams.

Automated Package Gating

Block vulnerable or non-compliant packages at the CI/CD level. Configurable rules evaluate every dependency before it reaches production.

  • Configurable rule sets per repository
  • Short-circuit evaluation for fast CI/CD
  • Transitive dependency analysis
  • Approval workflow integration

Vulnerability Detection

Real-time scanning against NVD and GitHub Security Advisories with intelligent rate limiting and caching.

NVD GHSA CVE

License Compliance

Automatically categorize licenses, detect GPL/copyleft risks, and enforce license policies across your organization.

MIT Apache-2.0 GPL Detection

SBOM Generation

Automatic Software Bill of Materials generation in CycloneDX 1.5 and SPDX 2.3 formats with SHA256 integrity verification.

CycloneDX SPDX

Approval Workflows

Route blocked packages through approval workflows. Security teams can review, approve, or reject exception requests.

RBAC Audit Trail

Private Registry Support

Resolve packages from private NuGet feeds. Credentials are encrypted with AES-256-GCM and isolated per account.

NuGet.config Encrypted

Signature Verification

Verify package authenticity with Sigstore, X.509, and PGP signatures. Configurable verification levels from None to Strict across all 10 ecosystems.

Sigstore X.509 PGP

Analytics & Health Scoring

Organization-wide health scoring with time-series metrics. Track vulnerability trends, license compliance rates, and maintainer trust across all repositories.

Health Score Trends

Four pillars of
dependency governance

Configure granular rules across four critical dimensions. Each category provides specialized checks to protect your software supply chain.

Security

Protect against known vulnerabilities and malicious packages before they enter your codebase.

  • CVE severity thresholds (Critical, High, Medium, Low)
  • Package signature verification requirements
  • Known malware and typosquatting detection
  • Supply chain integrity hash verification
12K+ CVEs tracked
NVD + GHSA Data sources

Compliance

Enforce license policies and maintain audit trails for regulatory requirements.

  • License allowlist/blocklist enforcement
  • GPL/copyleft contamination detection
  • Automatic SBOM generation (CycloneDX, SPDX)
  • 50+ audit event types for SOC 2 compliance
200+ License types
2 formats SBOM output

Quality

Ensure package health and maintainer reliability for long-term stability.

  • Deprecated package detection and blocking
  • Package age and update frequency thresholds
  • Maintainer trust scoring and analysis
  • Download popularity and community health
Configurable Age limits
Per-repo Thresholds

Supply Chain

Verify package provenance and detect tampering across the entire dependency tree.

  • Sigstore, X.509, and PGP signature validation
  • Lock file integrity verification
  • Registry vs. mirror tampering detection
  • Transitive dependency depth controls
10 Ecosystems
4 levels Verification

From commit to
verified deployment

01

Submit Verification

CI/CD pipeline runs Dependo CLI to auto-detect and verify manifest files (package-lock.json, .csproj, packages.lock.json).

# Install and run Dependo CLI
$ npm install -g @dependo/cli

$ dependo verify \
    --rule-sets your-rule-set-name \
    --wait --verbose
02

Parallel Analysis

19 specialized RabbitMQ workers analyze packages concurrently: vulnerability scanning, signature verification, license detection, and maintainer trust scoring.

VulnerabilityAnalysisWorker
PackageEnrichmentWorker
SignatureVerificationWorker
03

Rule Evaluation

Packages evaluated against configurable rule sets. Violations trigger blocks or approval requests.

PASS No Critical CVEs
PASS License Allowlist
BLOCK Deprecated Package
04

Gate Decision

Verification result returned: Passed, Rejected, or RequiresApproval. CI/CD pipeline proceeds or fails accordingly.

Rejected
Packages 247
Violations 3
SBOM Generated

Multi-ecosystem
dependency coverage

Dependo supports the most popular package ecosystems with unified governance policies.

NPM

package.json, package-lock.json

Full Support

NuGet

.csproj, packages.lock.json

Full Support

Maven

pom.xml

Supported

PyPI

requirements.txt, Pipfile

Supported

Go

go.mod, go.sum

Supported

Cargo

Cargo.toml, Cargo.lock

Supported

RubyGems

Gemfile, Gemfile.lock

Supported

Composer

composer.json, composer.lock

Supported

Gradle

build.gradle, gradle.lockfile

Supported

Poetry

pyproject.toml, poetry.lock

Supported

Native CI/CD
pipeline integration

Install the CLI, add one command, and you're protected. Auto-detects manifests and git context.

.github/workflows/dependo.yml
name: Dependo Package Verification

on: [push, pull_request]

jobs:
  verify-dependencies:
    runs-on: ubuntu-latest
    steps:
      - uses: actions/checkout@v4

      - name: Install Dependo CLI
        run: npm install -g @dependo/cli

      - name: Verify packages
        env:
          DEPENDO_API_KEY: ${{ secrets.DEPENDO_API_KEY }}
        run: |
          dependo verify \
            --rule-sets ${{ vars.DEPENDO_RULE_SETS }} \
            --wait \
            --verbose
azure-pipelines.yml
trigger:
  - main

pool:
  vmImage: 'ubuntu-latest'

steps:
- task: NodeTool@0
  inputs:
    versionSpec: '20.x'

- script: npm install -g @dependo/cli
  displayName: 'Install Dependo CLI'

- script: |
    dependo verify \
      --rule-sets $(DEPENDO_RULE_SETS) \
      --wait \
      --verbose
  displayName: 'Verify packages'
  env:
    DEPENDO_API_KEY: $(DEPENDO_API_KEY)
REST API
# Create verification
POST /api/v1/package-gate/verify
Content-Type: application/json
X-API-Key: your-api-key

{
  "repositoryName": "myorg/myrepo",
  "branch": "main",
  "commitHash": "abc123...",
  "projectFiles": [
    {
      "fileName": "package-lock.json",
      "content": "<base64-encoded>"
    }
  ],
  "ruleSetIds": ["uuid-1", "uuid-2"]
}

# Response
{
  "id": "verification-uuid",
  "status": "Passed",
  "totalPackages": 247,
  "violatingPackages": 0,
  "processingTimeMs": 3420
}

Built for
enterprise compliance

Dependo is designed from the ground up for enterprise security requirements, with multi-tenancy isolation, encrypted credential storage, and comprehensive audit logging.

AES-256-GCM Encryption

Registry credentials and API keys encrypted at rest

Multi-Tenant Isolation

Account-scoped data with validated ownership checks

Comprehensive Audit Trail

50+ event types, 14 action categories for SOC 2 compliance

Circuit Breaker Resilience

Automatic failover and cached fallback during outages

Verification Report 2.3s
247 Packages Scanned
0 Critical CVEs
2 License Issues
SBOM Generated CycloneDX 1.5
SHA256: e3b0c44298fc1c149af...
No Critical Vulnerabilities
Approved Licenses Only
No Deprecated Packages
2 packages need approval

Deploy your way:
SaaS or Self-Hosted

Choose the deployment model that fits your organization's security requirements, compliance needs, and operational preferences.

Recommended

Cloud SaaS

Managed service with zero infrastructure overhead

  • Instant setup—start in minutes
  • Automatic updates & patches
  • 99.9% uptime SLA
  • Managed scaling & performance
  • 24/7 monitoring & support
  • SOC 2 Type II compliant
Ideal for

Teams wanting fast deployment, minimal ops burden, and predictable costs.

Get Started with SaaS
Enterprise

Self-Hosted

Full control in your own infrastructure

  • Deploy on-premises or private cloud
  • Air-gapped environment support
  • Data sovereignty & compliance
  • Custom integrations & extensions
  • Docker & Kubernetes ready
  • Enterprise support included
Ideal for

Organizations with strict data residency requirements or existing infrastructure.

Request Self-Hosted License

Feature Comparison

Infrastructure Management Fully managed You control
Data Location Our secure cloud Your infrastructure
Updates & Patches Automatic Self-managed
Scaling Auto-scaling Manual / Kubernetes
Air-Gap Support
Setup Time Minutes Hours to days

Frequently asked
questions

Dependo supports 10 major package ecosystems: NPM (JavaScript), NuGet (.NET), Maven (Java), PyPI (Python), Go modules, Cargo (Rust), RubyGems (Ruby), Composer (PHP), Gradle (Java/Kotlin), and Poetry (Python). NPM and NuGet have full production support including private registry integration. All ecosystems support vulnerability scanning, license detection, and SBOM generation.

Install the Dependo CLI (npm install -g @dependo/cli) and run dependo verify --wait in your pipeline. The CLI auto-detects manifest files, reads git context, and returns proper exit codes. GitHub Actions, Azure DevOps, GitLab CI, Jenkins, and CircleCI examples are all documented. Integration takes under 5 minutes.

Dependo queries the National Vulnerability Database (NVD) and GitHub Security Advisories (GHSA) in real-time. Results are cached for 24 hours with intelligent rate limiting to stay within API limits. We use token bucket algorithms to maximize throughput—100 packages can be analyzed in under 2 minutes.

Yes. Include your NuGet.config file as a project file in the verification request. Dependo parses the config, extracts package sources and credentials, encrypts them with AES-256-GCM, and uses them during package resolution. Credentials are isolated per account and never exposed in API responses.

Dependo generates SBOMs in CycloneDX 1.5 (JSON) and SPDX 2.3 (JSON) formats. Both per-repository and organization-wide SBOMs are available. Each SBOM includes a SHA256 hash for integrity verification. Generation happens automatically after verification when enabled in settings.

Most verifications complete in under 5 seconds thanks to parallel worker architecture and aggressive caching. Cache hits return in under 100ms. For uncached packages, vulnerability scanning and enrichment happen concurrently. The fingerprint-based cache provides 60-80% hit rates for identical manifests across repositories.

Blocked packages can trigger an automatic approval workflow. Security teams receive notifications and can approve, reject, or request changes. Once approved, the package is whitelisted for future verifications. You can also configure "StopOnFirstBlockingRule" for fast-fail CI/CD pipelines.

Yes. Dependo is built with enterprise scale in mind: multi-tenant architecture with account isolation, 4-tier role hierarchy (Owner/Admin/Member/Viewer), 9 authorization policies covering 220+ operations, hierarchical rule sets, distributed caching with Redis, and 19 RabbitMQ-based workers for parallel processing. Circuit breakers protect against external API failures.

Dependo verifies package authenticity using Sigstore (for npm provenance), X.509 certificates (NuGet, Maven), and PGP signatures (RubyGems, Composer). You can configure verification levels per ecosystem: None, Basic, Standard, or Strict. Supply chain integrity checks compare lock file hashes against registry metadata to detect tampering.

Join the
early access program

Be among the first teams to secure your software supply chain with Dependo. Get priority access, direct support, and influence the product roadmap.

Priority onboarding
Direct Slack support
Influence product roadmap
Extended free tier

Ready to secure your
software supply chain?

Join enterprise teams using Dependo to eliminate vulnerable dependencies before they ship.