Use this template
Open Dependency Vulnerability Scanner in Devin and create the automation with the default configuration. You can customize it before saving.
What this automation does
Where the Security Vulnerability Scan template focuses on running scanners, this one focuses on acting on the output: sorting findings by severity, correlating with already-open tickets (to avoid duplicates), and producing actionable work with clear fix recommendations.How it works
Trigger: Schedule event —recurring
- Event:
schedule:recurring- Conditions:
rrulematchesFREQ=DAILY;BYHOUR=9;BYMINUTE=0
- Conditions:
Prerequisites
- Integrations:
Example prompt
The template ships with this prompt. You can edit it after clicking Use template, or leave it as-is.Setting it up
- Open Automations → Templates in Devin.
- Click Dependency Vulnerability Scanner. The create page opens with this template pre-filled.
- Connect any required integrations and install MCP servers if you haven’t already.
- Replace any placeholder values in the trigger conditions (for example, swap
your-org/your-repofor your actual repo). - Review the prompt and adjust it for your team’s language, conventions, and guardrails.
- Click Create automation.
When to use this template
- Security-focused teams needing ongoing dependency hygiene
- Compliance programs requiring vulnerability ticketing
- Reducing mean time to remediation (MTTR) for known CVEs
- Multi-repo organizations with many languages and package managers
Customization ideas
- Scope to specific repos or package ecosystems
- Route critical vulnerabilities to a high-priority escalation channel
- Integrate with your ticket system (Linear, Jira, GitHub Issues)
- Combine with Security Vulnerability Scan for scan-and-fix coverage
