Skip to content

Commit 12727e8

Browse files
author
Analysis Tools Bot
committed
Commit list
1 parent 3f8a584 commit 12727e8

2 files changed

Lines changed: 38 additions & 9 deletions

File tree

README.md

Lines changed: 7 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -492,6 +492,8 @@ Dialyzer starts its analysis from either debug-compiled BEAM bytecode or from E
492492
<h2>Fortran</h2>
493493

494494

495+
- [Fortitude](https://fortitude.readthedocs.io) — Fortran linter, inspired by (and built on) Ruff, and based on community best practices. Supports latest Fortran (2023) standard.
496+
495497
- [fprettify](https://pypi.python.org/pypi/fprettify) :warning: — Auto-formatter for modern fortran source code, written in Python.
496498
Fprettify is a tool that provides consistent whitespace, indentation, and delimiter alignment in code, including the ability to change letter case and handle preprocessor directives, all while preserving revision history and tested for editor integration.
497499

@@ -1210,7 +1212,7 @@ Kani verifies:
12101212

12111213
- [prae](https://github.com/teenjuna/prae) :warning: — Provides a convenient macro that allows you to generate type wrappers that promise to always uphold arbitrary invariants that you specified.
12121214

1213-
- [Prusti](https://www.pm.inf.ethz.ch/research/prusti.html) — A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.
1215+
- [Prusti](https://www.pm.inf.ethz.ch/research/prusti.html) :warning: — A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.
12141216

12151217
- [Rudra](https://github.com/sslab-gatech/Rudra) :warning: — Rust Memory Safety & Undefined Behavior Detection. It is capable of analyzing single Rust packages as well as all the packages on crates.io.
12161218

@@ -1362,7 +1364,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
13621364
<h2>WebAssembly</h2>
13631365

13641366

1365-
- [Twiggy](https://rustwasm.github.io/twiggy) :warning: — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1367+
- [Twiggy](https://rustwasm.github.io/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
13661368

13671369
- [wasm-language-tools](https://github.com/g-plane/wasm-language-tools) — WebAssembly Language Tools aims to provide and improve the editing experience of WebAssembly Text Format. It also provides an out-of-the-box formatter (a.k.a. pretty printer) for WebAssembly Text Format.
13681370

@@ -1679,7 +1681,7 @@ It supports multiple languages and is designed to be extensible, allowing you to
16791681
- [alquitran](https://github.com/ferivoz/alquitran) — Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations.
16801682
This project is intended to be used by maintainers of projects who want to offer portable source code archives for as many systems as possible. Checking tar archives with alquitran before publishing them should help spotting issues before they reach distributors and users.
16811683

1682-
- [packj](https://github.com/ossillate-inc/packj) — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1684+
- [packj](https://github.com/ossillate-inc/packj) :warning: — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
16831685

16841686
- [pure](https://github.com/ronomon/pure) :warning: — Pure is a static analysis file format checker that checks ZIP files for dangerous compression ratios, spec deviations, malicious archive signatures, mismatching local and central directory headers, ambiguous UTF-8 filenames, directory and symlink traversals, invalid MS-DOS dates, overlapping headers, overflow, underflow, sparseness, accidental buffer bleeds etc.
16851687

@@ -1730,7 +1732,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
17301732

17311733
- [rust-audit](https://github.com/Shnatsel/rust-audit) — Audit Rust binaries for known bugs or security vulnerabilities. This works by embedding data about the dependency tree (Cargo.lock) in JSON format into a dedicated linker section of the compiled executable.
17321734

1733-
- [Twiggy](https://rustwasm.github.io/twiggy) :warning: — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1735+
- [Twiggy](https://rustwasm.github.io/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
17341736

17351737
- [VMware chap](https://github.com/vmware/chap) — chap analyzes un-instrumented ELF core files for leaks, memory growth, and corruption. It is sufficiently reliable that it can be used in automation to catch leaks before they are committed. As an interactive tool, it helps explain memory growth, can identify some forms of corruption, and supplements a debugger by giving the status of various memory locations.
17361738

@@ -2304,7 +2306,7 @@ TruffleHog is an open source secret-scanning engine that resolves exposed secret
23042306
<h2>Translation</h2>
23052307

23062308

2307-
- [dennis](https://github.com/willkg/dennis) — A set of utilities for working with PO files to ease development and improve quality.
2309+
- [dennis](https://github.com/willkg/dennis) :warning: — A set of utilities for working with PO files to ease development and improve quality.
23082310

23092311

23102312
<a name="vue" />

data/api/tools.json

Lines changed: 31 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5305,7 +5305,7 @@
53055305
"plans": null,
53065306
"description": "A set of utilities for working with PO files to ease development and improve quality.",
53075307
"discussion": null,
5308-
"deprecated": null,
5308+
"deprecated": true,
53095309
"resources": null,
53105310
"reviews": null,
53115311
"demos": null,
@@ -7528,6 +7528,33 @@
75287528
"demos": null,
75297529
"wrapper": null
75307530
},
7531+
"fortitude": {
7532+
"name": "Fortitude",
7533+
"categories": [
7534+
"linter"
7535+
],
7536+
"languages": [
7537+
"fortran"
7538+
],
7539+
"other": [],
7540+
"licenses": [
7541+
"MIT License"
7542+
],
7543+
"types": [
7544+
"cli"
7545+
],
7546+
"homepage": "https://fortitude.readthedocs.io",
7547+
"source": "https://github.com/PlasmaFAIR/fortitude",
7548+
"pricing": null,
7549+
"plans": null,
7550+
"description": "Fortran linter, inspired by (and built on) Ruff, and based on community best practices. Supports latest Fortran (2023) standard.",
7551+
"discussion": null,
7552+
"deprecated": null,
7553+
"resources": null,
7554+
"reviews": null,
7555+
"demos": null,
7556+
"wrapper": null
7557+
},
75317558
"fprettify": {
75327559
"name": "fprettify",
75337560
"categories": [
@@ -12708,7 +12735,7 @@
1270812735
"plans": null,
1270912736
"description": "Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for \"risky\" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.",
1271012737
"discussion": null,
12711-
"deprecated": null,
12738+
"deprecated": true,
1271212739
"resources": null,
1271312740
"reviews": null,
1271412741
"demos": null,
@@ -14715,7 +14742,7 @@
1471514742
"plans": null,
1471614743
"description": "A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.",
1471714744
"discussion": null,
14718-
"deprecated": null,
14745+
"deprecated": true,
1471914746
"resources": null,
1472014747
"reviews": null,
1472114748
"demos": null,
@@ -20246,7 +20273,7 @@
2024620273
"plans": null,
2024720274
"description": "Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.",
2024820275
"discussion": null,
20249-
"deprecated": true,
20276+
"deprecated": null,
2025020277
"resources": null,
2025120278
"reviews": null,
2025220279
"demos": null,

0 commit comments

Comments
 (0)