This content originally appeared on DEV Community and was authored by Surajit Sen
Hey folks,
I’ve been playing around with Arch packaging and wanted to make something small but useful for the community. The result is pacguard, a simple command-line tool that checks your installed packages against the Arch Linux Security Tracker.
Think of it as a lightweight, Python-based take on arch-audit. It goes through your installed packages and reports:
Which packages are vulnerable
Advisory name & CVEs
Severity level
Suggested fix (if one exists)
If no fixes exist, it warns you to keep an eye on the tracker.
Example output:
[] Collecting installed packages… [] Fetching Arch Security Tracker data…
Vulnerable packages found:
openssl (installed 3.0.14-1) Advisory: ASA-2025-001 Affected: <= 3.0.14 Fixed: 3.0.15 Severity: Critical CVEs: CVE-2025-XXXX, CVE-2025-YYYY Suggested fix: sudo pacman -Syu openssl
Install
It’s on the AUR:
yay -S pacguard
Or clone from GitHub: https://github.com/blackXploit-404/pacguard
It’s simple and not perfect — I mainly made it to learn packaging and Python with pyalpm — but maybe it can help others too. Feedback, ideas, or PRs are welcome!
This content originally appeared on DEV Community and was authored by Surajit Sen