jeremylong / malicious-dependencies
Demonstrates how a malicious dependency could negatively impact the build output.
☆25Updated last year
Alternatives and similar repositories for malicious-dependencies:
Users that are interested in malicious-dependencies are comparing it to the libraries listed below
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆116Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆133Updated last year
- 🧪 Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.☆39Updated 4 months ago
- boostsecurityio/lotp☆124Updated 3 weeks ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆11Updated 7 months ago
- ☆35Updated 3 years ago
- A small tool to help developers understand a huge set of security requirements from appsec teams☆45Updated 2 years ago
- Manager of third-party sources of Semgrep rules 🗂☆81Updated 9 months ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆26Updated last week
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- AI featured threat modeling and security review action☆43Updated 5 months ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 9 months ago
- ☆104Updated 2 weeks ago
- A community collection of security reviews of open source software components.☆93Updated last year
- ☆25Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- ☆41Updated 2 months ago
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆23Updated last week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆75Updated last year
- An experimental project using LLM technology to generate security documentation for Open Source Software (OSS) projects☆28Updated 2 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆194Updated last week
- Dependency Combobulator☆93Updated last year
- A collection of my Semgrep rules☆49Updated last year
- ☆18Updated 3 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆64Updated 10 months ago
- ☆110Updated last year
- OWASP Foundation Web Respository☆28Updated 8 months ago