roave/security-advisories
Composer dev-only package that blocks installing dependencies with known security vulnerabilities by adding conflict rules. No runtime code or API—just prevents insecure versions during composer require/update to keep your PHP/Laravel supply chain safer.
Install the package as a dev dependency in your Laravel project:
composer require --dev roave/security-advisories
That’s it—no configuration needed. From now on, Composer will reject installation or updates of dependencies with known CVEs during composer require, composer update, or composer install. For example:
# This will now fail with a clear error
composer require laravel/framework:6.0.0
Verify it works by running:
composer update --dry-run roave/security-advisories
This triggers advisory checks without modifying your lock file.
composer.json’s require-dev and run composer install in CI without --no-dev. Failures block merging.husky/pre-commit) to run composer update --dry-run and catch vulnerabilities before commits.CVE-2022-1234) to cross-reference with GitHub Advisories or SCA tools like Dependabot.CONTRIBUTING.md: “We use automated security guards—don’t override without justification.”--no-dev for updates: Skipping dev dependencies bypasses the advisory checks entirely.composer update roave/security-advisories monthly or tie it to your SCA review cycle.config.allow-plugins.roave/security-advisories setting should only be used for documented, verified false positives (e.g., "roave/security-advisories": { "allow": ["*"] } in CI only).composer require ... --no-plugins only for temporary debugging—not as a fix.How can I help you explore Laravel packages today?