Skip to content

Commit cd77ee4

Browse files
author
Analysis Tools Bot
committed
Commit list
1 parent 6bec1f8 commit cd77ee4

File tree

2 files changed

+166
-0
lines changed

2 files changed

+166
-0
lines changed

README.md

Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -566,6 +566,8 @@ By default, govulncheck makes requests to the Go vulnerability database at https
566566

567567
- [nargs](https://github.com/alexkohler/nargs) — Finds unused arguments in function declarations.
568568

569+
- [OSV-Scanner](https://osv.dev/) — Vulnerability scanner written in Go which uses the data provided by OSV.dev. Developed by Google to scan dependencies across multiple languages and package managers for known vulnerabilities. Supports container scanning, license scanning, and guided remediation. Works with lockfiles, SBOMs, and container images to identify security issues.
570+
569571
- [prealloc](https://github.com/alexkohler/prealloc) — Finds slice declarations that could potentially be preallocated.
570572

571573
- [Reviewdog](https://github.com/haya14busa/reviewdog) — A tool for posting review comments from any linter in any code hosting service.
@@ -994,6 +996,8 @@ It uses the pycodestyle utility to determine what parts of the code needs to be
994996

995997
- [mypy](http://www.mypy-lang.org) — A static type checker that aims to combine the benefits of duck typing and static typing, frequently used with [MonkeyType](https://github.com/Instagram/MonkeyType).
996998

999+
- [pip-audit](https://github.com/pypa/pip-audit) — Tool for scanning Python packages for known vulnerabilities. Developed by the Python Packaging Authority (PyPA) and supported by Trail of Bits and Google. Scans Python environments and requirements files to identify vulnerable packages and suggests remediation. Supports GitHub Actions, pre-commit hooks, and multiple vulnerability service integrations.
1000+
9971001
- [prospector](https://github.com/PyCQA/prospector) — A wrapper around `pylint`, `pep8`, `mccabe` and others.
9981002

9991003
- **py-find-injection** :warning: — Find SQL injection vulnerabilities in Python code.
@@ -1032,6 +1036,8 @@ It uses the pycodestyle utility to determine what parts of the code needs to be
10321036

10331037
- [ruff](https://astral.sh/ruff) — Fast Python linter, written in Rust. 10-100x faster than existing linters. Compatible with Python 3.10. Supports file watcher.
10341038

1039+
- [Safety](https://safetycli.com/) — Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.
1040+
10351041
- [unimport](https://unimport.hakancelik.dev) — A linter, formatter for finding and removing unused import statements.
10361042

10371043
- [vulture](https://github.com/jendrikseipp/vulture) — Find unused classes, functions and variables in Python code.
@@ -1834,8 +1840,12 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
18341840

18351841
- **Docker Label Inspector** :warning: — Lint and validate Dockerfile labels.
18361842

1843+
- [Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1844+
18371845
- [GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
18381846

1847+
- [Grype](https://github.com/anchore/grype) — Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.
1848+
18391849
- [Haskell Dockerfile Linter](https://github.com/lukasmartinelli/hadolint) — A smarter Dockerfile linter that helps you build best practice Docker images.
18401850

18411851
- [kics](https://kics.io/) — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible
@@ -1914,6 +1924,8 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
19141924

19151925
- [Cloud (IaC) Security for JetBrains IDEs](https://plugins.jetbrains.com/plugin/25413-cloud-iac-security) — Cloud (IaC) Security plugin for JetBrains IDEs. Performs real-time inspections of Docker & Kubernetes IaC with 50+ rules based on Docker image/build security best practices, Kubernetes Pod Security Standards, and NSA/CISA Kubernetes Hardening Guidance.
19161926

1927+
- [Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1928+
19171929

19181930
<a name="embedded" />
19191931
<h2>Embedded</h2>
@@ -2197,6 +2209,8 @@ but with the following improvements:
21972209
- [detect-secrets](https://github.com/Yelp/detect-secrets) — An enterprise friendly way of detecting and preventing secrets in code.
21982210
It does this by running periodic diff outputs against heuristically crafted regex statements, to identify whether any new secret has been committed. This way, it avoids the overhead of digging through all git history, as well as the need to scan the entire repository every time.
21992211

2212+
- [Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
2213+
22002214
- **Enlightn** :warning: — A static and dynamic analysis tool for Laravel applications that provides recommendations to improve the performance, security and code reliability of Laravel apps. Contains 120 automated checks.
22012215

22022216
- [GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
@@ -2205,6 +2219,8 @@ It does this by running periodic diff outputs against heuristically crafted rege
22052219

22062220
- [gokart](https://github.com/praetorian-inc/gokart) — Golang security analysis with a focus on minimizing false positives. It is capable of tracing the source of variables and function arguments to determine whether input sources are safe.
22072221

2222+
- [Grype](https://github.com/anchore/grype) — Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.
2223+
22082224
- [HasMySecretLeaked](https://gitguardian.com/hasmysecretleaked) :copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
22092225

22102226
- **iblessing** :warning: — iblessing is an iOS security exploiting toolkit. It can be used for reverse engineering, binary analysis and vulnerability mining.
@@ -2236,10 +2252,14 @@ Kani verifies:
22362252

22372253
- [NodeJSScan](https://opensecurity.in) — A static security code scanner for Node.js applications powered by libsast and semgrep that builds on the njsscan cli tool. It features a UI with various dashboards about an application's security status.
22382254

2255+
- [OSV-Scanner](https://osv.dev/) — Vulnerability scanner written in Go which uses the data provided by OSV.dev. Developed by Google to scan dependencies across multiple languages and package managers for known vulnerabilities. Supports container scanning, license scanning, and guided remediation. Works with lockfiles, SBOMs, and container images to identify security issues.
2256+
22392257
- [Oversecured](https://oversecured.com) :copyright: — Enterprise vulnerability scanner for Android and iOS apps. It allows app owners and developers to secure each new version of a mobile app by integrating Oversecured into the development process.
22402258

22412259
- [OWASP Noir](https://owasp-noir.github.io/noir/) — Attack surface detector that identifies endpoints by static analysis.
22422260

2261+
- [pip-audit](https://github.com/pypa/pip-audit) — Tool for scanning Python packages for known vulnerabilities. Developed by the Python Packaging Authority (PyPA) and supported by Trail of Bits and Google. Scans Python environments and requirements files to identify vulnerable packages and suggests remediation. Supports GitHub Actions, pre-commit hooks, and multiple vulnerability service integrations.
2262+
22432263
- [PT Application Inspector](https://www.ptsecurity.com) :copyright: — Identifies code flaws and detects vulnerabilities to prevent web attacks. Demonstrates remote code execution by presenting possible exploits.
22442264

22452265
- [Qualys Container Security](https://www.qualys.com/apps/container-security) :copyright: — Container native application protection to provide visibility and control of containerized applications.
@@ -2248,6 +2268,8 @@ Kani verifies:
22482268

22492269
- [Rezilion](https://www.rezilion.com/) :copyright: — Discovers vulnerabilities for all components in your environment, filters out 85% non-exploitable vulnerabilities and creates a remediation plan and open tickets to upgrade components that violate your security policy and/or patch automatically in CI.
22502270

2271+
- [Safety](https://safetycli.com/) — Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.
2272+
22512273
- [scorecard](https://github.com/ossf/scorecard) — Security Scorecards - Security health metrics for Open Source
22522274

22532275
- [SearchDiggity](https://resources.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/) :copyright: — Identifies vulnerabilities in open source code projects hosted on Github, Google Code, MS CodePlex, SourceForge, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, etc.

data/api/tools.json

Lines changed: 144 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6012,6 +6012,35 @@
60126012
"demos": null,
60136013
"wrapper": null
60146014
},
6015+
"dockle": {
6016+
"name": "Dockle",
6017+
"categories": [
6018+
"linter"
6019+
],
6020+
"languages": [],
6021+
"other": [
6022+
"container",
6023+
"dockerfile",
6024+
"security"
6025+
],
6026+
"licenses": [
6027+
"Apache License 2.0"
6028+
],
6029+
"types": [
6030+
"cli"
6031+
],
6032+
"homepage": "https://github.com/goodwithtech/dockle",
6033+
"source": "https://github.com/goodwithtech/dockle",
6034+
"pricing": null,
6035+
"plans": null,
6036+
"description": "Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.",
6037+
"discussion": null,
6038+
"deprecated": null,
6039+
"resources": null,
6040+
"reviews": null,
6041+
"demos": null,
6042+
"wrapper": null
6043+
},
60156044
"dodgy": {
60166045
"name": "Dodgy",
60176046
"categories": [
@@ -8980,6 +9009,34 @@
89809009
"demos": null,
89819010
"wrapper": null
89829011
},
9012+
"grype": {
9013+
"name": "Grype",
9014+
"categories": [
9015+
"linter"
9016+
],
9017+
"languages": [],
9018+
"other": [
9019+
"container",
9020+
"security"
9021+
],
9022+
"licenses": [
9023+
"Apache License 2.0"
9024+
],
9025+
"types": [
9026+
"cli"
9027+
],
9028+
"homepage": "https://github.com/anchore/grype",
9029+
"source": "https://github.com/anchore/grype",
9030+
"pricing": null,
9031+
"plans": null,
9032+
"description": "Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.",
9033+
"discussion": null,
9034+
"deprecated": null,
9035+
"resources": null,
9036+
"reviews": null,
9037+
"demos": null,
9038+
"wrapper": null
9039+
},
89839040
"gulp-bootlint": {
89849041
"name": "gulp-bootlint",
89859042
"categories": [
@@ -12885,6 +12942,35 @@
1288512942
"demos": null,
1288612943
"wrapper": null
1288712944
},
12945+
"osv-scanner": {
12946+
"name": "OSV-Scanner",
12947+
"categories": [
12948+
"linter"
12949+
],
12950+
"languages": [
12951+
"go"
12952+
],
12953+
"other": [
12954+
"security"
12955+
],
12956+
"licenses": [
12957+
"Apache License 2.0"
12958+
],
12959+
"types": [
12960+
"cli"
12961+
],
12962+
"homepage": "https://osv.dev/",
12963+
"source": "https://github.com/google/osv-scanner",
12964+
"pricing": null,
12965+
"plans": null,
12966+
"description": "Vulnerability scanner written in Go which uses the data provided by OSV.dev. Developed by Google to scan dependencies across multiple languages and package managers for known vulnerabilities. Supports container scanning, license scanning, and guided remediation. Works with lockfiles, SBOMs, and container images to identify security issues.",
12967+
"discussion": null,
12968+
"deprecated": null,
12969+
"resources": null,
12970+
"reviews": null,
12971+
"demos": null,
12972+
"wrapper": null
12973+
},
1288812974
"oversecured": {
1288912975
"name": "Oversecured",
1289012976
"categories": [
@@ -14333,6 +14419,35 @@
1433314419
],
1433414420
"wrapper": null
1433514421
},
14422+
"pip-audit": {
14423+
"name": "pip-audit",
14424+
"categories": [
14425+
"linter"
14426+
],
14427+
"languages": [
14428+
"python"
14429+
],
14430+
"other": [
14431+
"security"
14432+
],
14433+
"licenses": [
14434+
"Apache License 2.0"
14435+
],
14436+
"types": [
14437+
"cli"
14438+
],
14439+
"homepage": "https://github.com/pypa/pip-audit",
14440+
"source": "https://github.com/pypa/pip-audit",
14441+
"pricing": null,
14442+
"plans": null,
14443+
"description": "Tool for scanning Python packages for known vulnerabilities. Developed by the Python Packaging Authority (PyPA) and supported by Trail of Bits and Google. Scans Python environments and requirements files to identify vulnerable packages and suggests remediation. Supports GitHub Actions, pre-commit hooks, and multiple vulnerability service integrations.",
14444+
"discussion": null,
14445+
"deprecated": null,
14446+
"resources": null,
14447+
"reviews": null,
14448+
"demos": null,
14449+
"wrapper": null
14450+
},
1433614451
"pixee": {
1433714452
"name": "Pixee",
1433814453
"categories": [],
@@ -17194,6 +17309,35 @@
1719417309
"demos": null,
1719517310
"wrapper": null
1719617311
},
17312+
"safety": {
17313+
"name": "Safety",
17314+
"categories": [
17315+
"linter"
17316+
],
17317+
"languages": [
17318+
"python"
17319+
],
17320+
"other": [
17321+
"security"
17322+
],
17323+
"licenses": [
17324+
"MIT License"
17325+
],
17326+
"types": [
17327+
"cli"
17328+
],
17329+
"homepage": "https://safetycli.com/",
17330+
"source": "https://github.com/pyupio/safety",
17331+
"pricing": null,
17332+
"plans": null,
17333+
"description": "Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.",
17334+
"discussion": null,
17335+
"deprecated": null,
17336+
"resources": null,
17337+
"reviews": null,
17338+
"demos": null,
17339+
"wrapper": null
17340+
},
1719717341
"saikuro": {
1719817342
"name": "Saikuro",
1719917343
"categories": [

0 commit comments

Comments
 (0)