snyk / nodejs-runtime-agentLinks
Snyk Node Runtime Agent
☆16Updated 3 years ago
Alternatives and similar repositories for nodejs-runtime-agent
Users that are interested in nodejs-runtime-agent are comparing it to the libraries listed below
Sorting:
- Vulnerabilities discovered in npm packages [Berkeley PL & Security Research]☆42Updated last year
- A Common Weakness Enumeration (CWE) Node.js SDK compliant with MITRE / CAPEC☆33Updated 7 months ago
- An extensible, heuristic-based vulnerability scanning tool for installed npm packages☆50Updated 3 years ago
- A zoo for malicious NPM packages☆20Updated 2 years ago
- ☆16Updated 6 years ago
- Mitigate security concerns of Dependency Confusion supply chain security risks☆48Updated last month
- An extended Node.js runtime with additional security mechanisms built-in. Protects your Node.js applications from injection attacks such …☆31Updated 4 years ago
- Find security vulnerabilities in open source npm packages while you code☆208Updated 3 years ago
- A CommonJS library for working with Common Vulnerability Scoring System vectors and scores.☆12Updated 3 years ago
- Fast and simple way to check any HTTP Headers☆46Updated 2 years ago
- JavaScript & Node.js open-source SAST scanner. A static analyser for detecting most common malicious patterns 🔬.☆253Updated last week
- A command line CWE discovery tool based on OWASP / CAPSEC database of Common Weakness Enumeration.☆60Updated 2 months ago
- Generic SAST Library☆132Updated last month
- Security design pattern support for Node.js☆24Updated 6 years ago
- umbrella config to achieve scanjs-like functionality through eslint☆88Updated 4 years ago
- rules for scanjs functionality☆28Updated 4 years ago
- Make it easy to probe the strengths and weaknesses of a hardened Node.js stack☆19Updated 6 years ago
- eslintrc.js config files for running static analysis on JavaScript to identify security issues.☆62Updated 4 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Externalize Java application access to protected resources as log messages.☆42Updated last month
- Search the common crawl using lambda functions☆94Updated 6 years ago
- Intentionally Vulnerable Node Applications☆16Updated 5 years ago
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Updated 2 years ago
- A pattern for reasonably secure Electron applications☆73Updated 2 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Updated 3 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- ☆32Updated 2 years ago
- Dependency Combobulator☆93Updated last year
- List of special metadata IPs used in cloud services☆11Updated 5 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 5 years ago