Checkout PacGuard.
Surajit Sen

Surajit Sen @sensurajit

About: Hey 👋 👩‍🎓 | College Student 📚 | Backend Dev 💻 | Cybersecurity & Hacking Enthusiast 🌐 | Transforming Ideas into Code 🚀

Location:
127.0.0.1
Joined:
Dec 9, 2023

Checkout PacGuard.

Publish Date: Sep 7
0 0

Hey folks,

I’ve been playing around with Arch packaging and wanted to make something small but useful for the community. The result is pacguard, a simple command-line tool that checks your installed packages against the Arch Linux Security Tracker.

Think of it as a lightweight, Python-based take on arch-audit. It goes through your installed packages and reports:

Which packages are vulnerable

Advisory name & CVEs

Severity level

Suggested fix (if one exists)

If no fixes exist, it warns you to keep an eye on the tracker.

Example output:

[] Collecting installed packages... [] Fetching Arch Security Tracker data...

Vulnerable packages found:

openssl (installed 3.0.14-1) Advisory: ASA-2025-001 Affected: <= 3.0.14 Fixed: 3.0.15 Severity: Critical CVEs: CVE-2025-XXXX, CVE-2025-YYYY Suggested fix: sudo pacman -Syu openssl
Enter fullscreen mode Exit fullscreen mode

Install

It’s on the AUR:

yay -S pacguard

Or clone from GitHub: https://github.com/blackXploit-404/pacguard

It’s simple and not perfect — I mainly made it to learn packaging and Python with pyalpm — but maybe it can help others too. Feedback, ideas, or PRs are welcome!

Comments 0 total

    Add comment