patched-codes / semgrep-rulesLinks
A collection of permissively licensed Semgrep rules.
β22Updated last year
Alternatives and similar repositories for semgrep-rules
Users that are interested in semgrep-rules are comparing it to the libraries listed below
Sorting:
- π§ͺ Correlate Semgrep scans with Python test coverage to prioritize SAST findings and get bug fix suggestions via a self-hosted LLM.β42Updated last year
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules πβ98Updated last month
- Focused malicious code detection ruleset, with a high protection-to-noise ratioβ142Updated 11 months ago
- A small tool to help developers understand a huge set of security requirements from appsec teamsβ46Updated 3 years ago
- Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of hβ¦β72Updated 11 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. β¦β68Updated 7 months ago
- atom is a novel intermediate representation for applications and a standalone tool that is powered by chen.β84Updated this week
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.β60Updated last month
- AI featured threat modeling and security review actionβ45Updated last year
- Data about all known supply-chain attacks through historyβ63Updated 8 months ago
- EZGHSA is a command-line tool for summarizing and filtering vulnerability alerts on Github repositories.β35Updated last month
- β114Updated 2 years ago
- Vulnerability database and package search for sources such as Linux, OSV, NVD, GitHub and npm. Powered by sqlite, CVE 5.2, purl, and versβ¦β135Updated this week
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIsβ73Updated last year
- Semgrep-based Policy Controller for Kubernetesβ47Updated 10 months ago
- A Security Scanner for Goβ26Updated 6 years ago
- Unauthenticated enumeration of AWS IAM Roles.β26Updated 5 months ago
- HashiCorp-relevant rules for the Semgrep code analysis toolβ41Updated 2 years ago
- Demonstrates how a malicious dependency could negatively impact the build output.β25Updated 2 years ago
- Security tool against dependency typosquatting attacksβ54Updated this week
- Build a CVE library with aggregated CISA, EPSS and CVSS dataβ29Updated 2 years ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.β179Updated last month
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teamsβ78Updated this week
- β48Updated this week
- Find which of your direct GitHub dependencies is susceptible to RepoJacking attacksβ61Updated 3 years ago
- The security workflow engine!β136Updated 2 months ago
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,β¦β70Updated 4 months ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java, cobol)β41Updated 2 months ago
- Sharing software supply chain security open source projectsβ53Updated 3 years ago
- A comprehensive list of software composition analysis tools.β162Updated 3 months ago