dependency-check / Dependency-Check_Action
Github action to run dependency check
☆75Updated 8 months ago
Alternatives and similar repositories for Dependency-Check_Action:
Users that are interested in Dependency-Check_Action are comparing it to the libraries listed below
- OWASP Foundation Web Respository☆82Updated 2 months ago
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated 9 months ago
- Exports vulnerability scan data from the Checkmarx SAST platform for use in analytical tools.☆19Updated 4 months ago
- Examples of integrating the Snyk CLI into a CI/CD system☆87Updated 4 months ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆170Updated 4 months ago
- A Python client for the Snyk API.☆95Updated 7 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- OWASP Foundation Web Respository☆55Updated last year
- Checkmarx CxFlow GitHub Action with SARIF output☆53Updated 2 months ago
- Github action to generate BoM and upload to OWASP dependency track for vulnerability analysis☆39Updated 6 months ago
- Software Component Verification Standard (SCVS)☆143Updated this week
- A tool to check the security settings of Github Organizations.☆71Updated last year
- Generate a score for your sbom to understand if it will actually be useful.☆227Updated 7 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆61Updated 9 months ago
- Publishes BOMs to Dependency-Track from GitHub Actions☆52Updated 6 months ago
- GitHub Advanced Security Policy as Code☆82Updated 2 weeks ago
- Examples of Custom Secret Scanning Patterns☆160Updated last month
- ⚡️Snyk API powered import tool to help you automate & monitor a large scale import into Snyk organizations. Designed for onboarding with …☆40Updated last week
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- Action to detect if a secret is initially detected in a pull request☆16Updated last month
- Compares and analyzes GCP IAM roles.☆77Updated 3 weeks ago
- ☆281Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆41Updated this week
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- StartLeft is an automation tool for generating Threat Models written in the Open Threat Model (OTM) format from a variety of different so…☆50Updated this week
- GitHub Advance Security Compliance Action☆133Updated 2 years ago
- OWASP Foundation Web Respository☆28Updated 7 months ago
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆56Updated last week
- Safer AWS SCP deployments via real-time monitoring☆50Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆98Updated last year