首页龙虾技能列表 › Golang Dependency Management — 技能工具

Golang Dependency Management — 技能工具

v1.1.2

Provides dependency management strategies for Golang projects including go.mod management, installing/upgrading packages, semantic versioning, Minimal Versio...

0· 143·0 当前·0 累计
by @samber (Samuel Berthe)·MIT-0
下载技能包
License
MIT-0
最后更新
2026/3/31
安全扫描
VirusTotal
无害
查看报告
OpenClaw
安全
high confidence
The skill's requirements, instructions, and install step are coherent with its stated goal of Go dependency management and vulnerability scanning — nothing disproportionate or unrelated is requested.
评估建议
This skill appears coherent and focused: it teaches and enforces safe Go dependency practices and installs govulncheck from an official golang.org package. Before installing, ensure you are comfortable with the skill installing a govulncheck binary into your Go bin directory and that your environment's GOPATH/GOBIN are set as you expect. Note the skill permits autonomous invocation (the platform default) — review your agent's permissions/policies if you do not want agents to act without confirma...
详细分析 ▾
用途与能力
Name/description match the requested bits: it needs the Go toolchain and govulncheck, and its advice and workflows focus on go.mod, go.sum, govulncheck, govulncheck-driven CI, vendoring, and visualizing module graphs. No unrelated credentials, binaries, or config paths are requested.
指令范围
SKILL.md gives concrete, scoped instructions for dependency operations, auditing, and CI integration. It explicitly requires asking the user before adding dependencies and instructs use of govulncheck, go mod tidy, etc. It does not instruct reading arbitrary files or exfiltrating secrets, nor does it reference environment variables beyond the declared tools.
安装机制
The only install spec is a go install for golang.org/x/vuln/cmd/govulncheck@latest — a standard, traceable install from an official golang.org package. This writes a binary (govulncheck) into the user's Go bin path, which is appropriate and expected for the skill's purpose.
凭证需求
No environment variables, credentials, or config paths are requested. The declared tool requirements (go, govulncheck) are proportional to a dependency-management skill.
持久化与权限
Flags show always:false and no unusual persistence. disable-model-invocation is false (normal), and the skill does not claim or request the ability to modify other skills or system-wide configs.
安全有层次,运行前请审查代码。

License

MIT-0

可自由使用、修改和再分发,无需署名。

运行时依赖

无特殊依赖

版本

latestv1.1.22026/3/23

- Added "AskUserQuestion" to allowed tools to enable user confirmation before adding new dependencies. - Updated metadata version to 1.1.2.

● 无害

安装命令 点击复制

官方npx clawhub@latest install golang-dependency-management
镜像加速npx clawhub@latest install golang-dependency-management --registry https://cn.clawhub-mirror.com

技能文档

Persona: You are a Go dependency steward. You treat every new dependency as a long-term maintenance commitment — you ask whether the standard library already solves the problem before reaching for an external package.

# Go Dependency Management

AI Agent Rule: Ask Before Adding Dependencies

Before running go get to add any new dependency, AI agents MUST ask the user for confirmation. AI agents can suggest packages that are unmaintained, low-quality, or unnecessary when the standard library already provides equivalent functionality. Using go get -u to upgrade an existing dependency is safe.

Before proposing a dependency, present:

  • Package name and import path
  • What it does and why it's needed
  • Whether the standard library covers the use case
  • GitHub stars, last commit date, and maintenance status (check via gh repo view)
  • License compatibility
  • Known alternatives

The samber/cc-skills-golang@golang-popular-libraries skill contains a curated list of vetted, production-ready libraries. Prefer recommending packages from that list. When no vetted option exists, favor well-known packages from the Go team (golang.org/x/...) or established organizations over obscure alternatives.

Key Rules

  • go.sum MUST be committed — it records cryptographic checksums of every dependency version, letting go mod verify detect supply-chain tampering. Without it, a compromised proxy could silently substitute malicious code
  • govulncheck ./... before every release — catches known CVEs in your dependency tree before they reach production
  • Check maintenance status, license, and stdlib alternatives before adding a dependency — every dependency increases attack surface, maintenance burden, and binary size
  • go mod tidy before every commit that changes dependencies — removes unused modules and adds missing ones, keeping go.mod honest

go.mod & go.sum

Essential Commands

CommandPurpose
go mod tidyAdd missing deps, remove unused ones
go mod downloadDownload modules to local cache
go mod verifyVerify cached modules match go.sum checksums
go mod vendorCopy deps into vendor/ directory
go mod editEdit go.mod programmatically (scripts, CI)
go mod graphPrint the module requirement graph
go mod whyExplain why a module or package is needed

Vendoring

Use go mod vendor when you need hermetic builds (no network access), reproducibility guarantees beyond checksums, or when deploying to environments without module proxy access. CI pipelines and Docker builds sometimes benefit from vendoring. Run go mod vendor after any dependency change and commit the vendor/ directory.

Installing & Upgrading Dependencies

Adding a Dependency

go get github.com/pkg/errors           # Latest version
go get github.com/pkg/errors@v0.9.1    # Specific version
go get github.com/pkg/errors@latest    # Explicitly latest
go get github.com/pkg/errors@master    # Specific branch (pseudo-version)

Upgrading

go get -u ./...            # Upgrade ALL direct+indirect deps to latest minor/patch
go get -u=patch ./...      # Upgrade to latest patch only (safer)
go get github.com/pkg@v1.5 # Upgrade specific package

Prefer go get -u=patch for routine updates — patch versions change no public API (semver promise), so they're unlikely to break your build. Minor version upgrades may add new APIs but can also deprecate or change behavior unexpectedly.

Removing a Dependency

go get github.com/pkg/errors@none   # Mark for removal
go mod tidy                          # Clean up go.mod and go.sum

Installing CLI Tools

go install github.com/golangci/golangci-lint/cmd/golangci-lint@latest

go install builds and installs a binary to $GOPATH/bin. Use @latest or a specific version tag — never @master for tools you depend on.

The tools.go Pattern

Pin tool versions in your module without importing them in production code:

//go:build tools

package tools

import ( _ "github.com/golangci/golangci-lint/cmd/golangci-lint" _ "golang.org/x/vuln/cmd/govulncheck" )

The build constraint ensures this file is never compiled. The blank imports keep the tools in go.mod so go install uses the pinned version. Run go mod tidy after creating this file.

Deep Dives

  • Versioning & MVS — Semantic versioning rules (major.minor.patch), when to increment each number, pre-release versions, the Minimal Version Selection (MVS) algorithm (why you can't just pick "latest"), and major version suffix conventions (v0, v1, v2 suffixes for breaking changes).
  • Auditing Dependencies — Vulnerability scanning with govulncheck, tracking outdated dependencies, analyzing which dependencies make the binary large (goweight), and distinguishing test-only vs binary dependencies to keep go.mod clean.
  • Dependency Conflicts & Resolution — Diagnosing version conflicts (what go get does when you request incompatible versions), resolution strategies (replace directives for local development, exclude for broken versions, retract for published versions that should be skipped), and workflows for conflicts across your dependency tree.
  • Go Workspacesgo.work files for multi-module development (e.g., library + example application), when to use workspaces vs monorepos, and workspace best practices.
  • Automated Dependency Updates — Setting up Dependabot or Renovate for automatic dependency update PRs, auto-merge strategies (when to merge automatically vs require review), and handling security updates.
  • Visualizing the Dependency Graphgo mod graph to inspect the full dependency tree, modgraphviz to visualize it, and interactive tools to find which dependency chains cause bloat.

Cross-References

  • → See samber/cc-skills-golang@golang-continuous-integration skill for Dependabot/Renovate CI setup
  • → See samber/cc-skills-golang@golang-security skill for vulnerability scanning with govulncheck
  • → See samber/cc-skills-golang@golang-popular-libraries skill for vetted library recommendations

Quick Reference

# Start a new module
go mod init github.com/user/project

# Add a dependency go get github.com/pkg/errors@v0.9.1

# Upgrade all deps (patch only, safer) go get -u=patch ./...

# Remove unused deps go mod tidy

# Check for vulnerabilities govulncheck ./...

# Check for outdated deps go list -u -m -json all | go-mod-outdated -update -direct

# Analyze binary size by dependency goweight

# Understand why a dep exists go mod why -m github.com/some/module

# Visualize dependency graph go mod graph | modgraphviz | dot -Tpng -o deps.png

# Verify checksums go mod verify

数据来源:ClawHub ↗ · 中文优化:龙虾技能库
OpenClaw 技能定制 / 插件定制 / 私有工作流定制

免费技能或插件可能存在安全风险,如需更匹配、更安全的方案,建议联系付费定制

了解定制服务