jpetrucciani / bandit-checkLinks
github action to run the bandit security linter
☆15Updated 2 weeks ago
Alternatives and similar repositories for bandit-check
Users that are interested in bandit-check are comparing it to the libraries listed below
Sorting:
- Unit testing framework for test driven security of AWS, GCP, Heroku and more.☆108Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Python Faker provider for security related data☆40Updated 3 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 2 months ago
- a tool to audit the istio service mesh☆173Updated 4 years ago
- ☆27Updated 3 years ago
- Audit python packages for known vulnerabilities☆33Updated 3 years ago
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- PolicyGlass allows you to analyse one or more AWS policies' effective permissions in aggregate, by restating them in the form of PolicySh…☆60Updated 3 years ago
- Static analysis for CloudFormation templates to identify common misconfiguration☆56Updated 3 years ago
- javaspringvulny - a Spring Boot web application built wrong on purpose☆23Updated 3 weeks ago
- CloudSplaining on AWS Managed Policies☆44Updated 3 months ago
- An SBOM query language and associated utilities☆54Updated last year
- One slackbot to rule them all☆87Updated 4 months ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- Security configuration checks for popular cloud native applications and infrastructure.☆119Updated 3 years ago
- Security scanning & static analysis tool☆93Updated last year
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆23Updated 5 years ago
- Check your Python environments for vulnerable Open Source packages with OSS Index or Sonatype Nexus Lifecycle.☆132Updated 6 months ago
- Securing Alice's, Bob's and Carl's software supply chain using in-toto☆101Updated last week
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 9 years ago
- Whole-infrastructure automation tooling for AWS☆43Updated 3 months ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆198Updated 2 years ago
- Validate all your Customer IAM Policies against AWS Access Analyzer - Policy Validation☆43Updated 4 years ago
- Assess certain AWS network configurations☆12Updated 7 years ago
- Public tables and other research that can accept PRs. Please visit the web link.☆44Updated 6 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 4 years ago
- ☆74Updated 5 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Updated 5 years ago
- Demos for several kubernetes security features☆64Updated 11 months ago