You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+22Lines changed: 22 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -566,6 +566,8 @@ By default, govulncheck makes requests to the Go vulnerability database at https
566
566
567
567
-[nargs](https://github.com/alexkohler/nargs) — Finds unused arguments in function declarations.
568
568
569
+
-[OSV-Scanner](https://osv.dev/) — Vulnerability scanner written in Go which uses the data provided by OSV.dev. Developed by Google to scan dependencies across multiple languages and package managers for known vulnerabilities. Supports container scanning, license scanning, and guided remediation. Works with lockfiles, SBOMs, and container images to identify security issues.
570
+
569
571
-[prealloc](https://github.com/alexkohler/prealloc) — Finds slice declarations that could potentially be preallocated.
570
572
571
573
-[Reviewdog](https://github.com/haya14busa/reviewdog) — A tool for posting review comments from any linter in any code hosting service.
@@ -994,6 +996,8 @@ It uses the pycodestyle utility to determine what parts of the code needs to be
994
996
995
997
-[mypy](http://www.mypy-lang.org) — A static type checker that aims to combine the benefits of duck typing and static typing, frequently used with [MonkeyType](https://github.com/Instagram/MonkeyType).
996
998
999
+
-[pip-audit](https://github.com/pypa/pip-audit) — Tool for scanning Python packages for known vulnerabilities. Developed by the Python Packaging Authority (PyPA) and supported by Trail of Bits and Google. Scans Python environments and requirements files to identify vulnerable packages and suggests remediation. Supports GitHub Actions, pre-commit hooks, and multiple vulnerability service integrations.
1000
+
997
1001
-[prospector](https://github.com/PyCQA/prospector) — A wrapper around `pylint`, `pep8`, `mccabe` and others.
998
1002
999
1003
-**py-find-injection**:warning: — Find SQL injection vulnerabilities in Python code.
@@ -1032,6 +1036,8 @@ It uses the pycodestyle utility to determine what parts of the code needs to be
1032
1036
1033
1037
-[ruff](https://astral.sh/ruff) — Fast Python linter, written in Rust. 10-100x faster than existing linters. Compatible with Python 3.10. Supports file watcher.
1034
1038
1039
+
-[Safety](https://safetycli.com/) — Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.
1040
+
1035
1041
-[unimport](https://unimport.hakancelik.dev) — A linter, formatter for finding and removing unused import statements.
1036
1042
1037
1043
-[vulture](https://github.com/jendrikseipp/vulture) — Find unused classes, functions and variables in Python code.
@@ -1834,8 +1840,12 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1834
1840
1835
1841
-**Docker Label Inspector**:warning: — Lint and validate Dockerfile labels.
1836
1842
1843
+
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1844
+
1837
1845
-[GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
1838
1846
1847
+
-[Grype](https://github.com/anchore/grype) — Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.
1848
+
1839
1849
-[Haskell Dockerfile Linter](https://github.com/lukasmartinelli/hadolint) — A smarter Dockerfile linter that helps you build best practice Docker images.
1840
1850
1841
1851
-[kics](https://kics.io/) — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible
@@ -1914,6 +1924,8 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1914
1924
1915
1925
-[Cloud (IaC) Security for JetBrains IDEs](https://plugins.jetbrains.com/plugin/25413-cloud-iac-security) — Cloud (IaC) Security plugin for JetBrains IDEs. Performs real-time inspections of Docker & Kubernetes IaC with 50+ rules based on Docker image/build security best practices, Kubernetes Pod Security Standards, and NSA/CISA Kubernetes Hardening Guidance.
1916
1926
1927
+
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1928
+
1917
1929
1918
1930
<aname="embedded" />
1919
1931
<h2>Embedded</h2>
@@ -2197,6 +2209,8 @@ but with the following improvements:
2197
2209
-[detect-secrets](https://github.com/Yelp/detect-secrets) — An enterprise friendly way of detecting and preventing secrets in code.
2198
2210
It does this by running periodic diff outputs against heuristically crafted regex statements, to identify whether any new secret has been committed. This way, it avoids the overhead of digging through all git history, as well as the need to scan the entire repository every time.
2199
2211
2212
+
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
2213
+
2200
2214
-**Enlightn**:warning: — A static and dynamic analysis tool for Laravel applications that provides recommendations to improve the performance, security and code reliability of Laravel apps. Contains 120 automated checks.
2201
2215
2202
2216
-[GitGuardian ggshield](https://www.gitguardian.com/ggshield) — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
@@ -2205,6 +2219,8 @@ It does this by running periodic diff outputs against heuristically crafted rege
2205
2219
2206
2220
-[gokart](https://github.com/praetorian-inc/gokart) — Golang security analysis with a focus on minimizing false positives. It is capable of tracing the source of variables and function arguments to determine whether input sources are safe.
2207
2221
2222
+
-[Grype](https://github.com/anchore/grype) — Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.
2223
+
2208
2224
-[HasMySecretLeaked](https://gitguardian.com/hasmysecretleaked):copyright: — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.
2209
2225
2210
2226
-**iblessing**:warning: — iblessing is an iOS security exploiting toolkit. It can be used for reverse engineering, binary analysis and vulnerability mining.
@@ -2236,10 +2252,14 @@ Kani verifies:
2236
2252
2237
2253
-[NodeJSScan](https://opensecurity.in) — A static security code scanner for Node.js applications powered by libsast and semgrep that builds on the njsscan cli tool. It features a UI with various dashboards about an application's security status.
2238
2254
2255
+
-[OSV-Scanner](https://osv.dev/) — Vulnerability scanner written in Go which uses the data provided by OSV.dev. Developed by Google to scan dependencies across multiple languages and package managers for known vulnerabilities. Supports container scanning, license scanning, and guided remediation. Works with lockfiles, SBOMs, and container images to identify security issues.
2256
+
2239
2257
-[Oversecured](https://oversecured.com):copyright: — Enterprise vulnerability scanner for Android and iOS apps. It allows app owners and developers to secure each new version of a mobile app by integrating Oversecured into the development process.
2240
2258
2241
2259
-[OWASP Noir](https://owasp-noir.github.io/noir/) — Attack surface detector that identifies endpoints by static analysis.
2242
2260
2261
+
-[pip-audit](https://github.com/pypa/pip-audit) — Tool for scanning Python packages for known vulnerabilities. Developed by the Python Packaging Authority (PyPA) and supported by Trail of Bits and Google. Scans Python environments and requirements files to identify vulnerable packages and suggests remediation. Supports GitHub Actions, pre-commit hooks, and multiple vulnerability service integrations.
2262
+
2243
2263
-[PT Application Inspector](https://www.ptsecurity.com):copyright: — Identifies code flaws and detects vulnerabilities to prevent web attacks. Demonstrates remote code execution by presenting possible exploits.
2244
2264
2245
2265
-[Qualys Container Security](https://www.qualys.com/apps/container-security):copyright: — Container native application protection to provide visibility and control of containerized applications.
@@ -2248,6 +2268,8 @@ Kani verifies:
2248
2268
2249
2269
-[Rezilion](https://www.rezilion.com/):copyright: — Discovers vulnerabilities for all components in your environment, filters out 85% non-exploitable vulnerabilities and creates a remediation plan and open tickets to upgrade components that violate your security policy and/or patch automatically in CI.
2250
2270
2271
+
-[Safety](https://safetycli.com/) — Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.
2272
+
2251
2273
-[scorecard](https://github.com/ossf/scorecard) — Security Scorecards - Security health metrics for Open Source
2252
2274
2253
2275
-[SearchDiggity](https://resources.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/):copyright: — Identifies vulnerabilities in open source code projects hosted on Github, Google Code, MS CodePlex, SourceForge, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, etc.
"description": "Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.",
6037
+
"discussion": null,
6038
+
"deprecated": null,
6039
+
"resources": null,
6040
+
"reviews": null,
6041
+
"demos": null,
6042
+
"wrapper": null
6043
+
},
6015
6044
"dodgy": {
6016
6045
"name": "Dodgy",
6017
6046
"categories": [
@@ -8980,6 +9009,34 @@
8980
9009
"demos": null,
8981
9010
"wrapper": null
8982
9011
},
9012
+
"grype": {
9013
+
"name": "Grype",
9014
+
"categories": [
9015
+
"linter"
9016
+
],
9017
+
"languages": [],
9018
+
"other": [
9019
+
"container",
9020
+
"security"
9021
+
],
9022
+
"licenses": [
9023
+
"Apache License 2.0"
9024
+
],
9025
+
"types": [
9026
+
"cli"
9027
+
],
9028
+
"homepage": "https://github.com/anchore/grype",
9029
+
"source": "https://github.com/anchore/grype",
9030
+
"pricing": null,
9031
+
"plans": null,
9032
+
"description": "Vulnerability scanner for container images and filesystems. Developed by Anchore, it scans container images, directories, and archives for known vulnerabilities. Supports multiple image formats, SBOM integration, and VEX (Vulnerability Exploitability eXchange) for accurate vulnerability assessment. Works with various vulnerability databases and provides detailed reporting.",
"description": "Vulnerability scanner written in Go which uses the data provided by OSV.dev. Developed by Google to scan dependencies across multiple languages and package managers for known vulnerabilities. Supports container scanning, license scanning, and guided remediation. Works with lockfiles, SBOMs, and container images to identify security issues.",
12967
+
"discussion": null,
12968
+
"deprecated": null,
12969
+
"resources": null,
12970
+
"reviews": null,
12971
+
"demos": null,
12972
+
"wrapper": null
12973
+
},
12888
12974
"oversecured": {
12889
12975
"name": "Oversecured",
12890
12976
"categories": [
@@ -14333,6 +14419,35 @@
14333
14419
],
14334
14420
"wrapper": null
14335
14421
},
14422
+
"pip-audit": {
14423
+
"name": "pip-audit",
14424
+
"categories": [
14425
+
"linter"
14426
+
],
14427
+
"languages": [
14428
+
"python"
14429
+
],
14430
+
"other": [
14431
+
"security"
14432
+
],
14433
+
"licenses": [
14434
+
"Apache License 2.0"
14435
+
],
14436
+
"types": [
14437
+
"cli"
14438
+
],
14439
+
"homepage": "https://github.com/pypa/pip-audit",
14440
+
"source": "https://github.com/pypa/pip-audit",
14441
+
"pricing": null,
14442
+
"plans": null,
14443
+
"description": "Tool for scanning Python packages for known vulnerabilities. Developed by the Python Packaging Authority (PyPA) and supported by Trail of Bits and Google. Scans Python environments and requirements files to identify vulnerable packages and suggests remediation. Supports GitHub Actions, pre-commit hooks, and multiple vulnerability service integrations.",
14444
+
"discussion": null,
14445
+
"deprecated": null,
14446
+
"resources": null,
14447
+
"reviews": null,
14448
+
"demos": null,
14449
+
"wrapper": null
14450
+
},
14336
14451
"pixee": {
14337
14452
"name": "Pixee",
14338
14453
"categories": [],
@@ -17194,6 +17309,35 @@
17194
17309
"demos": null,
17195
17310
"wrapper": null
17196
17311
},
17312
+
"safety": {
17313
+
"name": "Safety",
17314
+
"categories": [
17315
+
"linter"
17316
+
],
17317
+
"languages": [
17318
+
"python"
17319
+
],
17320
+
"other": [
17321
+
"security"
17322
+
],
17323
+
"licenses": [
17324
+
"MIT License"
17325
+
],
17326
+
"types": [
17327
+
"cli"
17328
+
],
17329
+
"homepage": "https://safetycli.com/",
17330
+
"source": "https://github.com/pyupio/safety",
17331
+
"pricing": null,
17332
+
"plans": null,
17333
+
"description": "Python dependency vulnerability scanner designed to enhance software supply chain security by detecting packages with known vulnerabilities. Checks Python dependencies against a database of known security vulnerabilities and provides detailed reports. Supports CI/CD integration and multiple output formats.",
0 commit comments