Hey folks,
I’ve been playing around with Arch packaging and wanted to make something small but useful for the community. The result is pacguard, a simple command-line tool that checks your installed packages against the Arch Linux Security Tracker.
Think of it as a lightweight, Python-based take on arch-audit. It goes through your installed packages and reports:
Which packages are vulnerable
Advisory name & CVEs
Severity level
Suggested fix (if one exists)
If no fixes exist, it warns you to keep an eye on the tracker.
Example output:
[] Collecting installed packages... [] Fetching Arch Security Tracker data...
Vulnerable packages found:
openssl (installed 3.0.14-1) Advisory: ASA-2025-001 Affected: <= 3.0.14 Fixed: 3.0.15 Severity: Critical CVEs: CVE-2025-XXXX, CVE-2025-YYYY Suggested fix: sudo pacman -Syu openssl
Install
It’s on the AUR:
yay -S pacguard
Or clone from GitHub: https://github.com/blackXploit-404/pacguard
It’s simple and not perfect — I mainly made it to learn packaging and Python with pyalpm — but maybe it can help others too. Feedback, ideas, or PRs are welcome!
Top comments (0)