You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-14Lines changed: 14 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -497,7 +497,7 @@ Fprettify is a tool that provides consistent whitespace, indentation, and delimi
497
497
498
498
-[errcheck](https://github.com/kisielk/errcheck) — Check that error return values are used.
499
499
500
-
-[errwrap](https://github.com/fatih/errwrap) — Wrap and fix Go errors with the new %w verb directive. This tool analyzes fmt.Errorf() calls and reports calls that contain a verb directive that is different than the new %w verb directive introduced in Go v1.13. It's also capable of rewriting calls to use the new %w wrap verb directive.
500
+
-**errwrap**:warning: — Wrap and fix Go errors with the new %w verb directive. This tool analyzes fmt.Errorf() calls and reports calls that contain a verb directive that is different than the new %w verb directive introduced in Go v1.13. It's also capable of rewriting calls to use the new %w wrap verb directive.
501
501
502
502
-[flen](https://github.com/lafolle/flen) — Get info on length of functions in a Go package.
503
503
@@ -556,7 +556,7 @@ By default, govulncheck makes requests to the Go vulnerability database at https
556
556
557
557
-[misspell](https://github.com/client9/misspell) — Finds commonly misspelled English words.
-[nargs](https://github.com/alexkohler/nargs) — Finds unused arguments in function declarations.
562
562
@@ -1228,7 +1228,7 @@ Kani verifies:
1228
1228
1229
1229
-**Prusti**:warning: — A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.
1230
1230
1231
-
-**Rudra**:warning: — Rust Memory Safety & Undefined Behavior Detection. It is capable of analyzing single Rust packages as well as all the packages on crates.io.
1231
+
-[Rudra](https://github.com/sslab-gatech/Rudra) — Rust Memory Safety & Undefined Behavior Detection. It is capable of analyzing single Rust packages as well as all the packages on crates.io.
1232
1232
1233
1233
-**Rust Language Server**:warning: — Supports functionality such as 'goto definition', symbol search, reformatting, and code completion, and enables renaming and refactorings.
1234
1234
@@ -1334,7 +1334,7 @@ Kani verifies:
1334
1334
1335
1335
-**Codelyzer**:warning: — A set of tslint rules for static code analysis of Angular 2 TypeScript projects.
1336
1336
1337
-
-[ENRE-ts](https://github.com/xjtu-enre/ENRE-ts) — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-ts is a ENtity Relationship Extractor for ECMAScript and TypeScript based on @babel/parser.
1337
+
-**ENRE-ts**:warning: — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-ts is a ENtity Relationship Extractor for ECMAScript and TypeScript based on @babel/parser.
1338
1338
1339
1339
-[fta](https://ftaproject.dev/) — Rust-based static analysis for TypeScript projects
1340
1340
@@ -1662,7 +1662,7 @@ orchestration to ensure zero breaking changes. Specialized for React, Next.js, a
1662
1662
1663
1663
-[Teamscale](https://teamscale.com):copyright: — Static and dynamic analysis tool supporting more than 25 languages and direct IDE integration. Free hosting for Open Source projects available on request. Free academic licenses available.
1664
1664
1665
-
-[TencentCodeAnalysis](https://tca.tencent.com/) — Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.
1665
+
-**TencentCodeAnalysis**:warning: — Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.
1666
1666
1667
1667
-[ThreatMapper](https://github.com/deepfence/ThreatMapper) — Vulnerability Scanner and Risk Evaluation for containers, serverless and hosts at runtime. ThreatMapper generates runtime BOMs from dependencies and operating system packages, matches against multiple threat feeds, scans for unprotected secrets, and scores issues based on severity and risk-of-exploit.
1668
1668
@@ -1722,10 +1722,10 @@ orchestration to ensure zero breaking changes. Specialized for React, Next.js, a
1722
1722
<h2>Archive</h2>
1723
1723
1724
1724
1725
-
-[alquitran](https://github.com/ferivoz/alquitran) — Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations.
1725
+
-**alquitran**:warning: — Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations.
1726
1726
This project is intended to be used by maintainers of projects who want to offer portable source code archives for as many systems as possible. Checking tar archives with alquitran before publishing them should help spotting issues before they reach distributors and users.
1727
1727
1728
-
-**packj**:warning: — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1728
+
-[packj](https://github.com/ossillate-inc/packj) — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1729
1729
1730
1730
-**pure**:warning: — Pure is a static analysis file format checker that checks ZIP files for dangerous compression ratios, spec deviations, malicious archive signatures, mismatching local and central directory headers, ambiguous UTF-8 filenames, directory and symlink traversals, invalid MS-DOS dates, overlapping headers, overflow, underflow, sparseness, accidental buffer bleeds etc.
1731
1731
@@ -1887,7 +1887,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1887
1887
1888
1888
-**Docker Label Inspector**:warning: — Lint and validate Dockerfile labels.
1889
1889
1890
-
-**Dockle**:warning: — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1890
+
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1891
1891
1892
1892
-[GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
1893
1893
@@ -1977,7 +1977,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1977
1977
1978
1978
-[Code Pathfinder](https://codepathfinder.dev) — An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.
1979
1979
1980
-
-**Dockle**:warning: — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1980
+
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1981
1981
1982
1982
1983
1983
<aname="embedded" />
@@ -2068,7 +2068,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
2068
2068
-[krane](https://github.com/appvia/krane) — Krane is a simple Kubernetes RBAC static analysis tool.
2069
2069
It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition.
2070
2070
2071
-
-**kube-hunter**:warning: — Hunt for security weaknesses in Kubernetes clusters.
2071
+
-[kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters.
2072
2072
2073
2073
-[kube-lint](https://github.com/viglesiasce/kube-lint) — A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them.
2074
2074
@@ -2284,7 +2284,7 @@ but with the following improvements:
2284
2284
-[detect-secrets](https://github.com/Yelp/detect-secrets) — An enterprise friendly way of detecting and preventing secrets in code.
2285
2285
It does this by running periodic diff outputs against heuristically crafted regex statements, to identify whether any new secret has been committed. This way, it avoids the overhead of digging through all git history, as well as the need to scan the entire repository every time.
2286
2286
2287
-
-**Dockle**:warning: — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
2287
+
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
2288
2288
2289
2289
-**Enlightn**:warning: — A static and dynamic analysis tool for Laravel applications that provides recommendations to improve the performance, security and code reliability of Laravel apps. Contains 120 automated checks.
2290
2290
@@ -2296,7 +2296,7 @@ It does this by running periodic diff outputs against heuristically crafted rege
2296
2296
2297
2297
-[Grype](https://github.com/anchore/grype) — Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.
2298
2298
2299
-
-[HasMySecretLeaked](https://gitguardian.com/hasmysecretleaked):copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2299
+
-**HasMySecretLeaked**:warning::copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2300
2300
2301
2301
-**iblessing**:warning: — iblessing is an iOS security exploiting toolkit. It can be used for reverse engineering, binary analysis and vulnerability mining.
2302
2302
@@ -2313,7 +2313,7 @@ Kani verifies:
2313
2313
2314
2314
-[kics](https://kics.io/) — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible
2315
2315
2316
-
-**kube-hunter**:warning: — Hunt for security weaknesses in Kubernetes clusters.
2316
+
-[kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters.
2317
2317
2318
2318
-[lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues
2319
2319
@@ -2461,7 +2461,7 @@ TruffleHog is an open source secret-scanning engine that resolves exposed secret
2461
2461
2462
2462
-[GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
2463
2463
2464
-
-[HasMySecretLeaked](https://gitguardian.com/hasmysecretleaked):copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2464
+
-**HasMySecretLeaked**:warning::copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
Copy file name to clipboardExpand all lines: data/api/tools.json
+10-10Lines changed: 10 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -268,7 +268,7 @@
268
268
"plans": null,
269
269
"description": "Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations.\nThis project is intended to be used by maintainers of projects who want to offer portable source code archives for as many systems as possible. Checking tar archives with alquitran before publishing them should help spotting issues before they reach distributors and users.",
270
270
"discussion": null,
271
-
"deprecated": null,
271
+
"deprecated": true,
272
272
"resources": null,
273
273
"reviews": null,
274
274
"demos": null,
@@ -6238,7 +6238,7 @@
6238
6238
"plans": null,
6239
6239
"description": "Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.",
6240
6240
"discussion": null,
6241
-
"deprecated": true,
6241
+
"deprecated": null,
6242
6242
"resources": null,
6243
6243
"reviews": null,
6244
6244
"demos": null,
@@ -6944,7 +6944,7 @@
6944
6944
"plans": null,
6945
6945
"description": "ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-ts is a ENtity Relationship Extractor for ECMAScript and TypeScript based on @babel/parser.",
6946
6946
"discussion": null,
6947
-
"deprecated": null,
6947
+
"deprecated": true,
6948
6948
"resources": null,
6949
6949
"reviews": null,
6950
6950
"demos": null,
@@ -7086,7 +7086,7 @@
7086
7086
"plans": null,
7087
7087
"description": "Wrap and fix Go errors with the new %w verb directive. This tool analyzes fmt.Errorf() calls and reports calls that contain a verb directive that is different than the new %w verb directive introduced in Go v1.13. It's also capable of rewriting calls to use the new %w wrap verb directive.",
7088
7088
"discussion": null,
7089
-
"deprecated": null,
7089
+
"deprecated": true,
7090
7090
"resources": null,
7091
7091
"reviews": null,
7092
7092
"demos": null,
@@ -9375,7 +9375,7 @@
9375
9375
"plans": null,
9376
9376
"description": "HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.",
9377
9377
"discussion": null,
9378
-
"deprecated": null,
9378
+
"deprecated": true,
9379
9379
"resources": null,
9380
9380
"reviews": null,
9381
9381
"demos": null,
@@ -11001,7 +11001,7 @@
11001
11001
"plans": null,
11002
11002
"description": "Hunt for security weaknesses in Kubernetes clusters.",
11003
11003
"discussion": null,
11004
-
"deprecated": true,
11004
+
"deprecated": null,
11005
11005
"resources": null,
11006
11006
"reviews": null,
11007
11007
"demos": null,
@@ -12846,7 +12846,7 @@
12846
12846
"plans": null,
12847
12847
"description": "Finds naked returns.",
12848
12848
"discussion": null,
12849
-
"deprecated": null,
12849
+
"deprecated": true,
12850
12850
"resources": null,
12851
12851
"reviews": null,
12852
12852
"demos": null,
@@ -13536,7 +13536,7 @@
13536
13536
"plans": null,
13537
13537
"description": "Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for \"risky\" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.",
13538
13538
"discussion": null,
13539
-
"deprecated": true,
13539
+
"deprecated": null,
13540
13540
"resources": null,
13541
13541
"reviews": null,
13542
13542
"demos": null,
@@ -17549,7 +17549,7 @@
17549
17549
"plans": null,
17550
17550
"description": "Rust Memory Safety & Undefined Behavior Detection. It is capable of analyzing single Rust packages as well as all the packages on crates.io.",
17551
17551
"discussion": null,
17552
-
"deprecated": true,
17552
+
"deprecated": null,
17553
17553
"resources": null,
17554
17554
"reviews": null,
17555
17555
"demos": null,
@@ -20619,7 +20619,7 @@
20619
20619
"plans": null,
20620
20620
"description": "Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.",
0 commit comments