snyk / cliLinks
Snyk CLI scans and monitors your projects for security vulnerabilities.
☆5,407Updated this week
Alternatives and similar repositories for cli
Users that are interested in cli are comparing it to the libraries listed below
Sorting:
- Vulnerability Static Analysis for Containers☆10,913Updated last week
- nodejsscan is a static security code scanner for Node.js applications.☆2,542Updated 3 months ago
- scanner detecting the use of JavaScript libraries with known vulnerabilities. Can also generate an SBOM of the libraries it finds.☆4,063Updated last week
- CLI tool and library for generating a Software Bill of Materials from container images and filesystems☆8,331Updated this week
- An enterprise friendly way of detecting and preventing secrets in code.☆4,412Updated 10 months ago
- OWASP dependency-check is a software composition analysis utility that detects publicly disclosed vulnerabilities in application dependen…☆7,413Updated this week
- Open source vulnerability DB and triage service.☆2,468Updated this week
- Lightweight static analysis for many languages. Find bug variants with patterns that look like source code.☆14,010Updated last week
- Cloud Native Runtime Security☆8,634Updated this week
- Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more☆31,199Updated last week
- Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supp…☆3,559Updated last week
- Open-Source Unified Vulnerability Management, DevSecOps & ASPM☆4,477Updated this week
- A vulnerability scanner for container images and filesystems☆11,469Updated this week
- OpenSSF Scorecard - Security health metrics for Open Source☆5,255Updated last week
- Fast, portable and reliable dependency analysis for any codebase. Supports license & vulnerability scanning for large monoliths. Langua…☆1,465Updated this week
- Hunt for security weaknesses in Kubernetes clusters☆4,996Updated last year
- A service that analyzes docker images and scans for vulnerabilities☆1,593Updated 3 years ago
- Detect compliance and security violations across Infrastructure as Code to mitigate risk before provisioning cloud native infrastructure.☆5,201Updated 2 months ago
- Official OWASP Top 10 Document Repository☆5,219Updated last month
- Cloud Security Posture Management (CSPM)☆3,693Updated 2 months ago
- Open Policy Agent (OPA) is an open source, general-purpose policy engine.☆11,192Updated this week
- Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark☆7,909Updated last week
- Dockerfile linter, validate inline bash, written in Haskell☆11,897Updated last week
- Supply-chain Levels for Software Artifacts☆1,803Updated this week
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,567Updated this week
- ESLint rules for Node Security☆2,321Updated 2 weeks ago
- Using a pre-commit hook, Talisman validates the outgoing changeset for things that look suspicious — such as tokens, passwords, and priva…☆2,062Updated this week
- CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security☆9,191Updated last week
- Easy and Repeatable Kubernetes Development☆15,730Updated this week
- Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.☆2,550Updated this week