LicenseHound

Your customer just asked for an SBOM.
You have hours, not days.

LicenseHound walks every transitive dependency in your repo, maps each to an SPDX license, and flags the ones procurement is going to flinch at — AGPL in your product code, "or later" clauses, packages with no metadata at all. Free CLI. Free GitHub Action. Paid dashboard when you're ready.

Get the v0.1 release (and the SBOM-request playbook):

No spam. Unsubscribe link in every email. We'll send you exactly two things: launch announcement, and a one-pager on responding to procurement license questions.

The problem, concretely

What LicenseHound does

30-second tour

$ pip install licensehound
$ licensehound scan .
Lockfiles scanned:
  ✓ /Users/dev/myapp/package-lock.json (147 packages)
  ✓ /Users/dev/myapp/uv.lock (38 packages)

License summary:
  MIT                    98 packages
  Apache-2.0             42 packages
  BSD-3-Clause           18 packages
  ISC                    14 packages
  GPL-3.0-or-later        2 packages
  (no metadata)           3 packages

  ⚠ 3 package(s) had no license metadata in the lockfile.
    Review manually or upgrade your lockfile.

v0.0.1 is shipping now — the parsers for npm and Python uv work today. pip install licensehound packaged on PyPI in a few days; meanwhile see the GitHub repo.

Pricing

Free

$0
  • CLI + GitHub Action
  • 1 repo
  • Built-in policy
  • Community support

Starter

$79/mo
  • 5 repos
  • Custom policies
  • Slack alerts
  • Historical SBOM

Team

$199/mo
  • 25 repos
  • Procurement PDF exports
  • Branch protection enforcement
  • Per-repo policy

Business

$499/mo
  • Unlimited repos
  • SSO / SAML
  • Audit log export
  • API access

Need this before the hosted dashboard ships? Early-access program is open: free CLI now plus weekly procurement-ready PDFs generated for you, until the dashboard lands. Email licensehound@quantcalc.app with a sentence about your stack and the customer/auditor ask.

Background reading

Questions

How is this different from Snyk Open Source / FOSSA / Black Duck?

Those tools are excellent and cost $10k–$50k/year because they sell into legal/security teams at companies that already have a compliance budget. LicenseHound sells into engineering at companies that don't — yet. We do less, on purpose, and we cost less.

How is this different from licensee / pip-licenses / Dependabot's license check?

Those are great free tools that handle the easy 80%. LicenseHound is built around the 20% that bites: dual-licensed packages, transitive resolution, "or later" clauses, packages with no SPDX metadata. We surface ambiguity instead of hiding it.

Is the CLI open source?

Yes. Apache 2.0 on GitHub. The hosted dashboard, multi-repo policy management, and procurement PDFs are the paid parts.

What if I just need to answer one customer's SBOM request and never again?

The free CLI handles that. Run licensehound scan --report sbom.pdf (in v0.0.2), send the PDF, done.

When does this ship?

v0.0.1 with the JavaScript / Python lockfile parsers and the basic CLI is on GitHub now. PyPI release in a few days. Rust and Go follow in June 2026. Hosted dashboard in July.