You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+13-13Lines changed: 13 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -232,7 +232,7 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
232
232
233
233
-[CppDepend](https://www.cppdepend.com):copyright: — Measure, query and visualize your code and avoid unexpected issues, technical debt and complexity.
234
234
235
-
-[cpplint](https://github.com/google/styleguide/tree/gh-pages/cpplint) — Automated C++ checker that follows Google's style guide.
235
+
-[cpplint](https://github.com/cpplint/cpplint) — Automated C++ checker that follows Google's style guide.
236
236
237
237
-[cqmetrics](https://github.com/dspinellis/cqmetrics) — Quality metrics for C code.
238
238
@@ -334,7 +334,7 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
334
334
335
335
-[CppDepend](https://www.cppdepend.com):copyright: — Measure, query and visualize your code and avoid unexpected issues, technical debt and complexity.
336
336
337
-
-[cpplint](https://github.com/google/styleguide/tree/gh-pages/cpplint) — Automated C++ checker that follows Google's style guide.
337
+
-[cpplint](https://github.com/cpplint/cpplint) — Automated C++ checker that follows Google's style guide.
338
338
339
339
-[cqmetrics](https://github.com/dspinellis/cqmetrics) — Quality metrics for C code.
340
340
@@ -421,7 +421,7 @@ Also check out the sister project, [awesome-dynamic-analysis](https://github.com
421
421
422
422
-[lint](https://github.com/passsy/dart-lint) — An opinionated, community-driven set of lint rules for Dart and Flutter projects. Like pedantic but stricter
423
423
424
-
-[Linter for dart](https://dart-lang.github.io/linter) — Style linter for Dart.
424
+
-[Linter for dart](https://github.com/dart-lang/linter) — Style linter for Dart.
425
425
426
426
427
427
<aname="delphi" />
@@ -484,7 +484,7 @@ Dialyzer starts its analysis from either debug-compiled BEAM bytecode or from E
-[FSharpLint](https://fsprojects.github.io/FSharpLint) — Lint tool for F#.
487
+
-[FSharpLint](https://github.com/fsprojects/FSharpLint) — Lint tool for F#.
488
488
489
489
-[ionide-analyzers](https://ionide.io/ionide-analyzers/) — A collection of F# analyzers, built with the FSharp.Analyzers.SDK.
490
490
@@ -695,7 +695,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
695
695
696
696
-[SpotBugs](https://spotbugs.github.io) — SpotBugs is FindBugs' successor. A tool for static analysis to look for bugs in Java code.
697
697
698
-
-[steady](https://eclipse.github.io/steady/) — Analyses your Java applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy.
698
+
-[steady](https://eclipse.github.io/steady/):warning:— Analyses your Java applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy.
699
699
700
700
-[Violations Lib](https://github.com/tomasbjerre/violations-lib) — Java library for parsing report files from static code analysis. Used by a bunch of Jenkins, Maven and Gradle plugins.
701
701
@@ -1367,7 +1367,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1367
1367
<h2>WebAssembly</h2>
1368
1368
1369
1369
1370
-
-[Twiggy](https://rustwasm.github.io/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1370
+
-[Twiggy](https://github.com/rustwasm/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1371
1371
1372
1372
-[wasm-language-tools](https://github.com/g-plane/wasm-language-tools) — WebAssembly Language Tools aims to provide and improve the editing experience of WebAssembly Text Format. It also provides an out-of-the-box formatter (a.k.a. pretty printer) for WebAssembly Text Format.
1373
1373
@@ -1400,11 +1400,11 @@ It supports multiple languages and is designed to be extensible, allowing you to
1400
1400
1401
1401
-[Better Code Hub](https://bettercodehub.com):copyright: — Better Code Hub checks your GitHub codebase against 10 engineering guidelines devised by the authority in software quality, Software Improvement Group.
1402
1402
1403
-
-[Betterscan CE](https://github.com/tcosolutions/betterscan-ce) — Checks your code and infra (various Git repositories supported, cloud stacks, CLI, Web Interface platform, integrationss available) for security and quality issues. Code Scanning/SAST/Linting using many tools/Scanners deduplicated with One Report (AI optional).
1403
+
-[Betterscan CE](https://github.com/tcosolutions/betterscan-ce):warning:— Checks your code and infra (various Git repositories supported, cloud stacks, CLI, Web Interface platform, integrationss available) for security and quality issues. Code Scanning/SAST/Linting using many tools/Scanners deduplicated with One Report (AI optional).
1404
1404
1405
1405
-[biome](https://biomejs.dev) — A toolchain for web projects, aimed to provide functionalities to maintain them. Biome formats and lints code in a fraction of a second. It is the successor to Rome. It is designed to eventually replace Biome is designed to eventually replace Babel, ESLint, webpack, Prettier, Jest, and others.
1406
1406
1407
-
-[BugProve](https://www.bugprove.com):copyright: — BugProve is a firmware analysis platform featuring both static and dynamic analysis techniques to discover memory corruptions, command injections and other classes or common weaknesses in binary code. It also detects vulnerable dependencies, weak cryptographic parameters, misconfigurations, and more.
1407
+
-[BugProve](https://www.bugprove.com):warning::copyright: — BugProve is a firmware analysis platform featuring both static and dynamic analysis techniques to discover memory corruptions, command injections and other classes or common weaknesses in binary code. It also detects vulnerable dependencies, weak cryptographic parameters, misconfigurations, and more.
1408
1408
1409
1409
-[callGraph](https://github.com/koknat/callGraph) — Statically generates a call graph image and displays it on screen.
1410
1410
@@ -1583,7 +1583,7 @@ It supports multiple languages and is designed to be extensible, allowing you to
1583
1583
1584
1584
-[SAST Online](https://sast.online/):copyright: — Check the Android Source code thoroughly to uncover and address potential security concerns and vulnerabilities. Static application security testing (Static Code Analysis) tool Online
1585
1585
1586
-
-[Scrutinizer](https://scrutinizer-ci.com):copyright: — A proprietary code quality checker that can be integrated with GitHub.
1586
+
-[Scrutinizer](https://scrutinizer-ci.com):warning::copyright: — A proprietary code quality checker that can be integrated with GitHub.
1587
1587
1588
1588
-[Security Code Scan](https://security-code-scan.github.io) — Security code analyzer for C# and VB.NET. Detects various security vulnerability patterns: SQLi, XSS, CSRF, XXE, Open Redirect, etc. Integrates into Visual Studio 2015 and newer. Detects various security vulnerability patterns: SQLi, XSS, CSRF, XXE, Open Redirect, etc.
1589
1589
@@ -1737,7 +1737,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1737
1737
1738
1738
-[rust-audit](https://github.com/Shnatsel/rust-audit) — Audit Rust binaries for known bugs or security vulnerabilities. This works by embedding data about the dependency tree (Cargo.lock) in JSON format into a dedicated linker section of the compiled executable.
1739
1739
1740
-
-[Twiggy](https://rustwasm.github.io/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1740
+
-[Twiggy](https://github.com/rustwasm/twiggy) — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
1741
1741
1742
1742
-[VMware chap](https://github.com/vmware/chap) — chap analyzes un-instrumented ELF core files for leaks, memory growth, and corruption. It is sufficiently reliable that it can be used in automation to catch leaks before they are committed. As an interactive tool, it helps explain memory growth, can identify some forms of corruption, and supplements a debugger by giving the status of various memory locations.
1743
1743
@@ -1777,7 +1777,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1777
1777
1778
1778
-[scsslint](https://github.com/brigade/scss-lint):warning: — Linter for SCSS files.
-[Stylelint](http://stylelint.io) — Linter for SCSS/CSS files.
1783
1783
@@ -2024,7 +2024,7 @@ but with the following improvements:
2024
2024
2025
2025
-[KubeLinter](https://github.com/stackrox/kube-linter) — KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.
2026
2026
2027
-
-[kubeval](https://kubeval.instrumenta.dev) — Validates your Kubernetes configuration files and supports multiple Kubernetes versions.
2027
+
-[kubeval](https://kubeval.instrumenta.dev):warning:— Validates your Kubernetes configuration files and supports multiple Kubernetes versions.
2028
2028
2029
2029
2030
2030
<aname="latex" />
@@ -2123,7 +2123,7 @@ but with the following improvements:
2123
2123
2124
2124
-[deadnix](https://github.com/astro/deadnix) — Scan Nix files for dead code (unused variable bindings)
2125
2125
2126
-
-[statix](https://git.peppe.rs/languages/statix/about/) — Lints and suggestions for the Nix programming language. "statix check" highlights antipatterns in Nix code. "statix fix" can fix several such occurrences.
2126
+
-[statix](https://github.com/nerdypepper/statix) — Lints and suggestions for the Nix programming language. "statix check" highlights antipatterns in Nix code. "statix fix" can fix several such occurrences.
Copy file name to clipboardExpand all lines: data/api/tools.json
+12-12Lines changed: 12 additions & 12 deletions
Original file line number
Diff line number
Diff line change
@@ -1195,7 +1195,7 @@
1195
1195
},
1196
1196
"description": "Checks your code and infra (various Git repositories supported, cloud stacks, CLI, Web Interface platform, integrationss available) for security and quality issues. Code Scanning/SAST/Linting using many tools/Scanners deduplicated with One Report (AI optional).",
1197
1197
"discussion": null,
1198
-
"deprecated": null,
1198
+
"deprecated": true,
1199
1199
"resources": null,
1200
1200
"reviews": null,
1201
1201
"demos": null,
@@ -1587,7 +1587,7 @@
1587
1587
},
1588
1588
"description": "BugProve is a firmware analysis platform featuring both static and dynamic analysis techniques to discover memory corruptions, command injections and other classes or common weaknesses in binary code. It also detects vulnerable dependencies, weak cryptographic parameters, misconfigurations, and more.",
1589
1589
"discussion": null,
1590
-
"deprecated": null,
1590
+
"deprecated": true,
1591
1591
"resources": [
1592
1592
{
1593
1593
"title": "BugProve Product Intro by John Hammond",
"description": "Analyses your Java applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy.",
0 commit comments