snyk-tech-services / snyk-scm-contributors-countLinks
Count distinct contributor of Snyk watched repos across several SCM
☆32Updated last year
Alternatives and similar repositories for snyk-scm-contributors-count
Users that are interested in snyk-scm-contributors-count are comparing it to the libraries listed below
Sorting:
- Examples of integrating the Snyk CLI into a CI/CD system☆92Updated 7 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- OWASP Foundation Web Respository☆97Updated 5 months ago
- Github action to generate BoM and upload to OWASP dependency track for vulnerability analysis☆42Updated 9 months ago
- Evaluate source control (GitHub) security posture☆250Updated 2 years ago
- For engineers and security teams driving fast and secure software supply chains☆83Updated 2 years ago
- Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat☆14Updated last year
- A utility to (re-)import findings and language data into DefectDojo☆43Updated 9 months ago
- Open source compliance tool for development platforms.☆286Updated last year
- ⚡️Snyk API powered import tool to help you automate & monitor a large scale import into Snyk organizations. Designed for onboarding with …☆41Updated last month
- Github action to run dependency check☆82Updated last month
- GitHub action to scan container images with Palo Alto Networks' Prisma Cloud☆58Updated 3 months ago
- ☆530Updated last week
- ☆285Updated 2 years ago
- Programmatically open new JIRA tickets for all Snyk Issues☆53Updated 3 months ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆108Updated last year
- GitGoat is an open source tool that was built to enable DevOps and Engineering teams to design and implement a sustainable misconfigurati…☆170Updated 5 months ago
- A tool for preventing the installation of malicious npm and PyPI packages☆150Updated last week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆102Updated last year
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆192Updated last year
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆173Updated 7 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆68Updated last year
- Generate a score for your sbom to understand if it will actually be useful.☆230Updated 11 months ago
- ☆117Updated last month
- ☆113Updated last week
- boostsecurityio/poutine☆306Updated 2 weeks ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆285Updated 10 months ago
- A deliberately vulnerable Kubernetes cluster☆127Updated last year
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆110Updated last week
- Script to audit GitHub Action Workflow files for potential vulnerabilities.☆156Updated 10 months ago