Open Source Package Analysis
☆876Feb 27, 2026Updated 2 months ago
Alternatives and similar repositories for package-analysis
Users that are interested in package-analysis are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A repository of reports of malicious packages identified in Open Source package repositories, consumable via the Open Source Vulnerabilit…☆497Updated this week
- Feed parsing for language package manager updates☆84Dec 4, 2024Updated last year
- Towards Measuring Supply Chain Attacks on Package Managers for Interpreted Languages☆140Oct 5, 2022Updated 3 years ago
- This repository complements our paper by offering the training dataset, the best-performing models utilized in our real-world experiment,…☆22Mar 7, 2025Updated last year
- GuardDog is a CLI tool to Identify malicious PyPI and npm packages☆1,068Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of tools for analyzing open source packages.☆360Apr 8, 2026Updated 3 weeks ago
- An open-source dataset of malicious software packages found in the wild, 100% vetted by humans.☆336Updated this week
- A fork of Bandit tool with patterns to identifying malicious python code.☆30Sep 1, 2022Updated 3 years ago
- Artifact accompanying our ICSE '22 paper "Practical Automated Detection of Malicious npm Packages"☆47Jan 25, 2022Updated 4 years ago
- OpenSSF Scorecard - Security health metrics for Open Source☆5,400Updated this week
- The repository has collected about 10,000 malicious pypi packages. This dataset is the work of the ASE 2023 paper "An Empirical Study of…☆119Mar 21, 2026Updated last month
- GUAC aggregates software security metadata into a high fidelity graph database.☆1,481Updated this week
- Vulnerability scanner written in Go which uses the data provided by https://osv.dev☆9,772Updated this week
- Scans Software Bill of Materials (SBOMs) for security vulnerabilities☆609Feb 10, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- The Artifacts for ICSE 2023 paper: Bad Snakes: Understanding and Improving Python Package Index Malware Scanning☆13Feb 8, 2026Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Helping allocate resources to secure the critical open source projects we all depend on.☆389May 8, 2025Updated 11 months ago
- Open source vulnerability DB and triage service.☆2,615Apr 23, 2026Updated last week
- Supply-chain Levels for Software Artifacts☆1,852Updated this week
- Open Source Vulnerability schema.☆246Updated this week
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆265Apr 22, 2026Updated last week
- OSV-SCALIBR: A library for Software Composition Analysis☆594Updated this week
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆523Updated this week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A vulnerability scanner for container images and filesystems☆12,081Updated this week
- A compilation of resources in the software supply chain security domain, with emphasis on open source☆357Apr 3, 2026Updated 3 weeks ago
- GitHub App to set and enforce security policies☆1,414Updated this week
- Packj stops Solarwinds-, ESLint-, and PyTorch-like attacks by flagging malicious/vulnerable open-source dependencies ("weak links") in y…☆686Apr 12, 2026Updated 2 weeks ago
- Security tool against dependency typosquatting attacks☆55Apr 21, 2026Updated last week
- ☆13Jun 26, 2023Updated 2 years ago
- A taxonomy of attacks on software supply chains in the form of an attack tree, based on and linked to numerous real-world incidents and o…☆82Apr 14, 2026Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,363Apr 21, 2026Updated last week
- A security layer for Git repositories☆612Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- CLI tool and library for generating a Software Bill of Materials from container images and filesystems☆8,822Updated this week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆356Apr 21, 2026Updated last week
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆146Feb 24, 2025Updated last year
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration☆308Updated this week
- Code signing and transparency for containers and binaries☆5,858Updated this week
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.☆14,911Updated this week
- Software Supply Chain Transparency Log☆1,127Updated this week