{{Project Name}} - Dependency Analysis Report Template
Generated with JAEGIS Enhanced Validation & Research
[[LLM: VALIDATION CHECKPOINT - Review shared context from dependency analysis and validate all dependency metrics. Integrate web research findings for current dependency management standards and security best practices.]]
Executive Summary
[[LLM: RESEARCH INTEGRATION - Include current dependency management best practices and validated security methodologies. All dependency reports must be supported by current security standards and vulnerability research.]]
Enhanced Report Overview
Project: {project_name} Report Type: Enhanced {report_type} with Validation Intelligence Generated By: Enhanced Dakota (Dependency Modernization Specialist with Advanced Intelligence) Report Date: {current_date} Analysis Period: {analysis_start_date} to {analysis_end_date} Context7 Research Quality: Enhanced {context7_quality_score}/10 with Validation Intelligence
[[LLM: VALIDATION CHECKPOINT - All dependency reports must be validated for security, accuracy, and current dependency standards. Include research-backed dependency management methodologies and security principles.]]
Executive Summary
π Key Metrics
Total Dependencies: {total_dependencies}
Direct Dependencies: {direct_dependencies}
Development Dependencies: {dev_dependencies}
Security Vulnerabilities: {security_vulnerabilities}
Outdated Packages: {outdated_packages}
License Issues: {license_issues}
Overall Health Score: {health_score}/100
π― Priority Actions Required
{priority_actions_summary}
π‘ Key Recommendations
{key_recommendations_summary}
Security Assessment
π‘οΈ Vulnerability Analysis
Critical
{critical_vulns}
{critical_packages}
{critical_actions}
High
{high_vulns}
{high_packages}
{high_actions}
Medium
{medium_vulns}
{medium_packages}
{medium_actions}
Low
{low_vulns}
{low_packages}
{low_actions}
π¨ Critical Security Issues
{critical_security_details}
π Security Recommendations
{security_recommendations}
Dependency Health Analysis
π¦ Package Categories
π Maintenance Status
Well Maintained
{well_maintained}
{well_maintained_pct}%
Monitor
Moderately Maintained
{moderate_maintained}
{moderate_maintained_pct}%
Review
Poorly Maintained
{poor_maintained}
{poor_maintained_pct}%
Replace
Abandoned
{abandoned}
{abandoned_pct}%
Urgent Replacement
Version Analysis
π Update Opportunities
{update_opportunities_table}
π Version Gap Analysis
Packages >1 Major Version Behind: {major_gaps}
Packages >6 Months Behind: {time_gaps}
Packages with Breaking Changes: {breaking_changes}
Packages with Security Patches: {security_patches}
License Compliance
π License Distribution
{license_distribution_table}
β οΈ License Concerns
{license_concerns}
β
Compliance Recommendations
{compliance_recommendations}
Performance Impact Analysis
β‘ Bundle Size Analysis
Total Bundle Size: {total_bundle_size}
Largest Dependencies: {largest_deps}
Potential Size Reduction: {size_reduction_potential}
Tree-shaking Opportunities: {tree_shaking_opportunities}
π Performance Recommendations
{performance_recommendations}
Context7 Research Insights
π¬ Automated Research Summary
{context7_research_summary}
π Community Intelligence
Popular Alternatives Discovered: {alternatives_found}
Migration Success Stories: {migration_stories}
Common Issues Identified: {common_issues}
Best Practices Gathered: {best_practices}
π― Research-Backed Recommendations
{research_backed_recommendations}
Detailed Package Analysis
π High-Priority Packages
{high_priority_packages_details}
π¦ Package-by-Package Assessment
{package_by_package_analysis}
Migration Roadmap
ποΈ Immediate Actions (Next 7 Days)
{immediate_actions}
π
Short-term Goals (Next 30 Days)
{short_term_goals}
π― Long-term Strategy (Next 90 Days)
{long_term_strategy}
β±οΈ Timeline Estimation
{timeline_estimation_table}
Risk Assessment
π² Risk Matrix
{risk_matrix_table}
π‘οΈ Risk Mitigation Strategies
{risk_mitigation_strategies}
Implementation Guidelines
π§ Technical Implementation
{technical_implementation_guide}
π₯ Team Coordination
{team_coordination_guide}
π§ͺ Testing Strategy
{testing_strategy}
π Rollback Procedures
{rollback_procedures}
Monitoring & Maintenance
π Ongoing Monitoring Setup
{monitoring_setup}
π Maintenance Schedule
{maintenance_schedule}
π Success Metrics
{success_metrics}
Appendices
π Appendix A: Complete Dependency List
{complete_dependency_list}
π Appendix B: Vulnerability Details
{vulnerability_details}
π Appendix C: License Information
{license_information}
π Appendix D: Useful Resources
{useful_resources}
Report Metadata
π§ Analysis Configuration
Analysis Tools Used: {analysis_tools}
Data Sources Consulted: {data_sources}
Context7 Queries Executed: {context7_queries}
Analysis Duration: {analysis_duration}
π Data Quality Indicators
Source Reliability Score: {source_reliability}/10
Data Freshness: {data_freshness}
Coverage Completeness: {coverage_completeness}%
Cross-validation Success: {cross_validation}%
π Next Report Schedule
Next Scheduled Report: {next_report_date}
Trigger Conditions: {trigger_conditions}
Monitoring Frequency: {monitoring_frequency}
Contact & Support
Report Generated By: Dakota (Dependency Modernization Specialist) JAEGIS Agent System: Version {JAEGIS_version} For Questions: Contact your development team lead Emergency Security Issues: Follow established security incident procedures
Report Version: {report_version} Template Version: {template_version} Last Updated: {template_last_updated}
This report was automatically generated using the JAEGIS Agent System with Context7 integration. All recommendations are based on current best practices, security advisories, and community intelligence as of the report generation date.
Last updated