You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-5Lines changed: 7 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -492,6 +492,8 @@ Dialyzer starts its analysis from either debug-compiled BEAM bytecode or from E
492
492
<h2>Fortran</h2>
493
493
494
494
495
+
-[Fortitude](https://fortitude.readthedocs.io) — Fortran linter, inspired by (and built on) Ruff, and based on community best practices. Supports latest Fortran (2023) standard.
496
+
495
497
-[fprettify](https://pypi.python.org/pypi/fprettify):warning: — Auto-formatter for modern fortran source code, written in Python.
496
498
Fprettify is a tool that provides consistent whitespace, indentation, and delimiter alignment in code, including the ability to change letter case and handle preprocessor directives, all while preserving revision history and tested for editor integration.
497
499
@@ -1210,7 +1212,7 @@ Kani verifies:
1210
1212
1211
1213
-[prae](https://github.com/teenjuna/prae):warning: — Provides a convenient macro that allows you to generate type wrappers that promise to always uphold arbitrary invariants that you specified.
1212
1214
1213
-
-[Prusti](https://www.pm.inf.ethz.ch/research/prusti.html) — A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.
1215
+
-[Prusti](https://www.pm.inf.ethz.ch/research/prusti.html):warning:— A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.
1214
1216
1215
1217
-[Rudra](https://github.com/sslab-gatech/Rudra):warning: — Rust Memory Safety & Undefined Behavior Detection. It is capable of analyzing single Rust packages as well as all the packages on crates.io.
1216
1218
@@ -1362,7 +1364,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1362
1364
<h2>WebAssembly</h2>
1363
1365
1364
1366
1365
-
-[Twiggy](https://rustwasm.github.io/twiggy):warning:— Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1367
+
-[Twiggy](https://rustwasm.github.io/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1366
1368
1367
1369
-[wasm-language-tools](https://github.com/g-plane/wasm-language-tools) — WebAssembly Language Tools aims to provide and improve the editing experience of WebAssembly Text Format. It also provides an out-of-the-box formatter (a.k.a. pretty printer) for WebAssembly Text Format.
1368
1370
@@ -1679,7 +1681,7 @@ It supports multiple languages and is designed to be extensible, allowing you to
1679
1681
-[alquitran](https://github.com/ferivoz/alquitran) — Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations.
1680
1682
This project is intended to be used by maintainers of projects who want to offer portable source code archives for as many systems as possible. Checking tar archives with alquitran before publishing them should help spotting issues before they reach distributors and users.
1681
1683
1682
-
-[packj](https://github.com/ossillate-inc/packj) — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1684
+
-[packj](https://github.com/ossillate-inc/packj):warning:— Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1683
1685
1684
1686
-[pure](https://github.com/ronomon/pure):warning: — Pure is a static analysis file format checker that checks ZIP files for dangerous compression ratios, spec deviations, malicious archive signatures, mismatching local and central directory headers, ambiguous UTF-8 filenames, directory and symlink traversals, invalid MS-DOS dates, overlapping headers, overflow, underflow, sparseness, accidental buffer bleeds etc.
1685
1687
@@ -1730,7 +1732,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1730
1732
1731
1733
-[rust-audit](https://github.com/Shnatsel/rust-audit) — Audit Rust binaries for known bugs or security vulnerabilities. This works by embedding data about the dependency tree (Cargo.lock) in JSON format into a dedicated linker section of the compiled executable.
1732
1734
1733
-
-[Twiggy](https://rustwasm.github.io/twiggy):warning:— Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1735
+
-[Twiggy](https://rustwasm.github.io/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1734
1736
1735
1737
-[VMware chap](https://github.com/vmware/chap) — chap analyzes un-instrumented ELF core files for leaks, memory growth, and corruption. It is sufficiently reliable that it can be used in automation to catch leaks before they are committed. As an interactive tool, it helps explain memory growth, can identify some forms of corruption, and supplements a debugger by giving the status of various memory locations.
1736
1738
@@ -2304,7 +2306,7 @@ TruffleHog is an open source secret-scanning engine that resolves exposed secret
2304
2306
<h2>Translation</h2>
2305
2307
2306
2308
2307
-
-[dennis](https://github.com/willkg/dennis) — A set of utilities for working with PO files to ease development and improve quality.
2309
+
-[dennis](https://github.com/willkg/dennis):warning:— A set of utilities for working with PO files to ease development and improve quality.
"description": "Fortran linter, inspired by (and built on) Ruff, and based on community best practices. Supports latest Fortran (2023) standard.",
7551
+
"discussion": null,
7552
+
"deprecated": null,
7553
+
"resources": null,
7554
+
"reviews": null,
7555
+
"demos": null,
7556
+
"wrapper": null
7557
+
},
7531
7558
"fprettify": {
7532
7559
"name": "fprettify",
7533
7560
"categories": [
@@ -12708,7 +12735,7 @@
12708
12735
"plans": null,
12709
12736
"description": "Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for \"risky\" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.",
12710
12737
"discussion": null,
12711
-
"deprecated": null,
12738
+
"deprecated": true,
12712
12739
"resources": null,
12713
12740
"reviews": null,
12714
12741
"demos": null,
@@ -14715,7 +14742,7 @@
14715
14742
"plans": null,
14716
14743
"description": "A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.",
14717
14744
"discussion": null,
14718
-
"deprecated": null,
14745
+
"deprecated": true,
14719
14746
"resources": null,
14720
14747
"reviews": null,
14721
14748
"demos": null,
@@ -20246,7 +20273,7 @@
20246
20273
"plans": null,
20247
20274
"description": "Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.",
0 commit comments