mikesamuel / node-sec-patternsLinks
Security design pattern support for Node.js
☆24Updated 6 years ago
Alternatives and similar repositories for node-sec-patterns
Users that are interested in node-sec-patterns are comparing it to the libraries listed below
Sorting:
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆19Updated 6 years ago
- rules for scanjs functionality☆28Updated 4 years ago
- Security advisories for Node.js and the JavaScript ecosystem.☆41Updated 4 years ago
- A zoo for malicious NPM packages☆20Updated 2 years ago
- umbrella config to achieve scanjs-like functionality through eslint☆88Updated 4 years ago
- Node.js vulnerability scanner☆103Updated 5 years ago
- Discussion area for security aspects of ECMAScript☆64Updated 7 years ago
- Derive property based testing fast-check into a fuzzer for REST APIs☆39Updated 4 years ago
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆33Updated 7 months ago
- TSLint security rules☆69Updated 5 years ago
- Policy management tool for Node.js☆22Updated 2 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Updated 3 years ago
- OWASP Serverless Top 10☆218Updated 4 years ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 4 years ago
- JavaScript Secure Coding Practices guide☆181Updated 4 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆49Updated 2 months ago
- [DEPRECATED] Static analysis tool for javascript code.☆427Updated 3 years ago
- Snyk Node Runtime Agent☆16Updated 3 years ago
- An SSRF-preventing wrapper around Node's request module☆26Updated 7 years ago
- Checks filenames to be committed against a library of filename rules to prevent sensitive files in Git☆67Updated last week
- Audits an NPM package.json file to identify known vulnerabilities.☆229Updated 2 months ago
- Content-Security-Policy report aggregator/analyzer☆54Updated 5 years ago
- Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]☆42Updated last year
- ☆39Updated 2 years ago
- Intentionally Vulnerable Node Applications☆16Updated 5 years ago
- ☆66Updated last month
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆61Updated 3 months ago
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆56Updated 2 months ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆181Updated 6 years ago
- This repository stores content that can be used to design a Rapid Threat Model Prototyping process for a software development group.☆163Updated 2 years ago