You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -963,6 +963,8 @@ It uses the pycodestyle utility to determine what parts of the code needs to be
963
963
964
964
-**ciocheck**:warning: — Linter, formatter and test suite helper. As a linter, it is a wrapper around `pep8`, `pydocstyle`, `flake8`, and `pylint`.
965
965
966
+
-[Code Pathfinder](https://codepathfinder.dev) — An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.
967
+
966
968
-**cohesion**:warning: — A tool for measuring Python class cohesion.
967
969
968
970
-[deal](https://deal.readthedocs.io/) — Design by contract for Python. Write bug-free code. By adding a few decorators to your code, you get for free tests, static analysis, formal verification, and much more.
@@ -1855,6 +1857,8 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1855
1857
1856
1858
-[clair](https://github.com/coreos/clair) — Vulnerability Static Analysis for Containers.
1857
1859
1860
+
-[Code Pathfinder](https://codepathfinder.dev) — An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.
1861
+
1858
1862
-**collector**:warning: — Run arbitrary scripts inside containers, and gather useful information.
1859
1863
1860
1864
-**dagda**:warning: — Perform static analysis of known vulnerabilities in docker images/containers.
@@ -1893,6 +1897,8 @@ It identifies potential security risks in K8s RBAC design and makes suggestions
1893
1897
1894
1898
-[Code Climate](https://codeclimate.com) — The open and extensible static analysis platform, for everyone.
1895
1899
1900
+
-[Code Pathfinder](https://codepathfinder.dev) — An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.
1901
+
1896
1902
-[Codecov](https://about.codecov.io/):copyright: — Codecov is a company that provides code coverage tools for developers and engineering leaders to gain visibility into their code coverage.
1897
1903
They offer flexible and unified reporting, seamless coverage insights, and robust coverage controls. Codecov supports over 20 languages and is CI/CD agnostic. Over 29,000 organizations and 1 million developers use Codecov. Codecov has recently joined Sentry.
1898
1904
@@ -1947,6 +1953,8 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1947
1953
1948
1954
-[Cloud (IaC) Security for JetBrains IDEs](https://plugins.jetbrains.com/plugin/25413-cloud-iac-security) — Cloud (IaC) Security plugin for JetBrains IDEs. Performs real-time inspections of Docker & Kubernetes IaC with 50+ rules based on Docker image/build security best practices, Kubernetes Pod Security Standards, and NSA/CISA Kubernetes Hardening Guidance.
1949
1955
1956
+
-[Code Pathfinder](https://codepathfinder.dev) — An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.
1957
+
1950
1958
-[Dockle](https://github.com/goodwithtech/dockle) — Container Image Linter for Security helping build the Best-Practice Docker Image. Scans Docker images for security vulnerabilities and CIS Benchmark compliance. Checks for secrets, credential exposure, and security best practices. Provides multiple severity levels (FATAL, WARN, INFO) and supports various output formats for CI/CD integration.
1951
1959
1952
1960
@@ -2241,6 +2249,8 @@ but with the following improvements:
2241
2249
2242
2250
-[Cloud (IaC) Security for JetBrains IDEs](https://plugins.jetbrains.com/plugin/25413-cloud-iac-security) — Cloud (IaC) Security plugin for JetBrains IDEs. Performs real-time inspections of Docker & Kubernetes IaC with 50+ rules based on Docker image/build security best practices, Kubernetes Pod Security Standards, and NSA/CISA Kubernetes Hardening Guidance.
2243
2251
2252
+
-[Code Pathfinder](https://codepathfinder.dev) — An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.
2253
+
2244
2254
-[Credential Digger](https://github.com/SAP/credential-digger) — Credential Digger is a GitHub scanning tool that identifies hardcoded credentials (Passwords, API Keys, Secret Keys, Tokens, personal information, etc), and filtering the false positive data through a machine learning model called [Password Model](https://huggingface.co/SAPOSS/password-model). This scanner is able to detect passwords and non structured tokens with a low false positive rate.
2245
2255
2246
2256
-[Datree](https://datree.io/) — A CLI tool to prevent Kubernetes misconfigurations by ensuring that manifests and Helm charts follow best practices as well as your organization’s policies
"description": "An open-source security suite aiming to combine structural code analysis with AI-powered vulnerability detection. Built for advanced structural search, derive insights, find vulnerabilities in code.",
0 commit comments