Technical Debt Audits
Scan your stack for CVEs, deprecated packages, and EOL versions. Get a health score. Fix what matters. Ship with confidence.
How We Audit
- Data sources: NVD (CVEs), npm registry (deprecations), endoflife.date (EOL schedules)
- Frequency: Data refreshed daily; individual audits run on-demand
- Scoring: Deterministic formula based on finding severity counts
Audits reflect point-in-time data. New vulnerabilities may be disclosed after your scan.
How It Works
Your Stack
next.js:14.2.0
prisma:5.10.0
node:20Automated Analysis
Actionable Report
Health score + prioritized fixesWhat We Detect
We scan for 6 categories of technical debt, each with a severity level that affects your health score.
Security CVEs
Known vulnerabilities from NVD with CVSS scores
Deprecated Packages
Libraries no longer receiving security patches
End-of-Life Versions
Runtimes past official support date
Available Upgrades
Newer versions with fixes or features
License Issues
GPL contamination, incompatible licenses
Breaking Changes
Major upgrades requiring code changes
Health Score
Stack Health Rating
Your score determines required actions
score = 100 − (critical × 20) − (high × 10) − (medium × 5) − (low × 2)Real Example
SaaS Startup Pre-Launch Audit
When Migration is Required
When fixes alone can't resolve the issues, a strategic stack migration becomes necessary.
E-commerce Platform - Legacy Stack Audit
Audit Findings
No security patches since April 2023. Known prototype pollution vulnerabilities.
Open redirect vulnerability. Upgrade path blocked by Node 14 dependency.
Cannot use Suspense, useTransition. Performance bottleneck on product pages.
End of life February 2024. Missing time-series and encryption features.
No module federation, tree-shaking issues. Developer productivity impacted.
100 − (2×20) − (2×10) − (1×5) = 35Migration Recommendation
Why This Migration Path?
Next.js has built-in security headers, CSRF protection, and active LTS support through 2026.
Turbopack reduces build times from 3min to 15sec. Hot reload under 100ms.
Incremental adoption possible. Existing React components work with minimal changes.
PostgreSQL has no license fees. Vercel deployment scales automatically.
Estimated Migration Timeline
When to Audit
Pre-Launch
Validate your stack has no known vulnerabilities before going live. Document results for compliance.
Monthly Review
Catch new CVEs within 30 days of disclosure. Track health score trends over time.
Before Major Upgrades
Audit before and after framework migrations. Confirm the upgrade resolved issues.
Client Deliverables
Include audit reports in client handoffs. Demonstrate security commitment.
IDE Integration
Run audits directly from your AI coding assistant. No context switching.
claude mcp add stacksfinder "npx" "-y" "@stacksfinder/mcp-server"create_audit Start a new technical debt audit for your stacklist_audits View your recent audit history with scoresget_audit Get detailed findings from a specific auditcompare_audits Compare two reports to track improvementsBest Practices
Always Include Versions
react:18.2.0 not just react. Specific versions enable accurate CVE detection.
Prioritize by Severity
Fix critical and high first. Batch low-severity into maintenance sprints.
Set a Target Score
Define team minimum (e.g., 80+). Create alerts when score drops below.
Document Exceptions
Some findings may be accepted risks. Document why for future team members.
Frequently Asked Questions
Frequently Asked Questions
Start Reducing Technical Debt
Create your first audit in under a minute. Get a health score and actionable fixes.