{{Project Name}} - Dependency Analysis Report Template

Generated with JAEGIS Enhanced Validation & Research

[[LLM: VALIDATION CHECKPOINT - Review shared context from dependency analysis and validate all dependency metrics. Integrate web research findings for current dependency management standards and security best practices.]]

Executive Summary

[[LLM: RESEARCH INTEGRATION - Include current dependency management best practices and validated security methodologies. All dependency reports must be supported by current security standards and vulnerability research.]]

Enhanced Report Overview

Project: {project_name} Report Type: Enhanced {report_type} with Validation Intelligence Generated By: Enhanced Dakota (Dependency Modernization Specialist with Advanced Intelligence) Report Date: {current_date} Analysis Period: {analysis_start_date} to {analysis_end_date} Context7 Research Quality: Enhanced {context7_quality_score}/10 with Validation Intelligence

[[LLM: VALIDATION CHECKPOINT - All dependency reports must be validated for security, accuracy, and current dependency standards. Include research-backed dependency management methodologies and security principles.]]


Executive Summary

πŸ“Š Key Metrics

  • Total Dependencies: {total_dependencies}

  • Direct Dependencies: {direct_dependencies}

  • Development Dependencies: {dev_dependencies}

  • Security Vulnerabilities: {security_vulnerabilities}

  • Outdated Packages: {outdated_packages}

  • License Issues: {license_issues}

  • Overall Health Score: {health_score}/100

🎯 Priority Actions Required

{priority_actions_summary}

πŸ’‘ Key Recommendations

{key_recommendations_summary}


Security Assessment

πŸ›‘οΈ Vulnerability Analysis

Severity
Count
Packages Affected
Immediate Action Required

Critical

{critical_vulns}

{critical_packages}

{critical_actions}

High

{high_vulns}

{high_packages}

{high_actions}

Medium

{medium_vulns}

{medium_packages}

{medium_actions}

Low

{low_vulns}

{low_packages}

{low_actions}

🚨 Critical Security Issues

{critical_security_details}

πŸ” Security Recommendations

{security_recommendations}


Dependency Health Analysis

πŸ“¦ Package Categories

πŸ“ˆ Maintenance Status

Status
Count
Percentage
Action Required

Well Maintained

{well_maintained}

{well_maintained_pct}%

Monitor

Moderately Maintained

{moderate_maintained}

{moderate_maintained_pct}%

Review

Poorly Maintained

{poor_maintained}

{poor_maintained_pct}%

Replace

Abandoned

{abandoned}

{abandoned_pct}%

Urgent Replacement


Version Analysis

πŸ”„ Update Opportunities

Package
Current Version
Latest Version
Type
Risk Level
Recommendation

{update_opportunities_table}

πŸ“Š Version Gap Analysis

  • Packages >1 Major Version Behind: {major_gaps}

  • Packages >6 Months Behind: {time_gaps}

  • Packages with Breaking Changes: {breaking_changes}

  • Packages with Security Patches: {security_patches}


License Compliance

πŸ“„ License Distribution

License Type
Count
Percentage
Compliance Status

{license_distribution_table}

⚠️ License Concerns

{license_concerns}

βœ… Compliance Recommendations

{compliance_recommendations}


Performance Impact Analysis

⚑ Bundle Size Analysis

  • Total Bundle Size: {total_bundle_size}

  • Largest Dependencies: {largest_deps}

  • Potential Size Reduction: {size_reduction_potential}

  • Tree-shaking Opportunities: {tree_shaking_opportunities}

πŸš€ Performance Recommendations

{performance_recommendations}


Context7 Research Insights

πŸ”¬ Automated Research Summary

{context7_research_summary}

πŸ“š Community Intelligence

  • Popular Alternatives Discovered: {alternatives_found}

  • Migration Success Stories: {migration_stories}

  • Common Issues Identified: {common_issues}

  • Best Practices Gathered: {best_practices}

🎯 Research-Backed Recommendations

{research_backed_recommendations}


Detailed Package Analysis

πŸ” High-Priority Packages

{high_priority_packages_details}

πŸ“¦ Package-by-Package Assessment

{package_by_package_analysis}


Migration Roadmap

πŸ—“οΈ Immediate Actions (Next 7 Days)

{immediate_actions}

πŸ“… Short-term Goals (Next 30 Days)

{short_term_goals}

🎯 Long-term Strategy (Next 90 Days)

{long_term_strategy}

⏱️ Timeline Estimation

Phase
Duration
Effort Required
Risk Level

{timeline_estimation_table}


Risk Assessment

🎲 Risk Matrix

Risk Category
Probability
Impact
Overall Risk
Mitigation Strategy

{risk_matrix_table}

πŸ›‘οΈ Risk Mitigation Strategies

{risk_mitigation_strategies}


Implementation Guidelines

πŸ”§ Technical Implementation

{technical_implementation_guide}

πŸ‘₯ Team Coordination

{team_coordination_guide}

πŸ§ͺ Testing Strategy

{testing_strategy}

πŸ“‹ Rollback Procedures

{rollback_procedures}


Monitoring & Maintenance

πŸ“Š Ongoing Monitoring Setup

{monitoring_setup}

πŸ”„ Maintenance Schedule

{maintenance_schedule}

πŸ“ˆ Success Metrics

{success_metrics}


Appendices

πŸ“š Appendix A: Complete Dependency List

{complete_dependency_list}

πŸ” Appendix B: Vulnerability Details

{vulnerability_details}

πŸ“„ Appendix C: License Information

{license_information}

πŸ”— Appendix D: Useful Resources

{useful_resources}


Report Metadata

πŸ”§ Analysis Configuration

  • Analysis Tools Used: {analysis_tools}

  • Data Sources Consulted: {data_sources}

  • Context7 Queries Executed: {context7_queries}

  • Analysis Duration: {analysis_duration}

πŸ“Š Data Quality Indicators

  • Source Reliability Score: {source_reliability}/10

  • Data Freshness: {data_freshness}

  • Coverage Completeness: {coverage_completeness}%

  • Cross-validation Success: {cross_validation}%

πŸ”„ Next Report Schedule

  • Next Scheduled Report: {next_report_date}

  • Trigger Conditions: {trigger_conditions}

  • Monitoring Frequency: {monitoring_frequency}


Contact & Support

Report Generated By: Dakota (Dependency Modernization Specialist) JAEGIS Agent System: Version {jaegis_version} For Questions: Contact your development team lead Emergency Security Issues: Follow established security incident procedures

Report Version: {report_version} Template Version: {template_version} Last Updated: {template_last_updated}


This report was automatically generated using the JAEGIS Agent System with Context7 integration. All recommendations are based on current best practices, security advisories, and community intelligence as of the report generation date.

Last updated