|
486 | 486 | "types": [ |
487 | 487 | "cli" |
488 | 488 | ], |
489 | | - "homepage": "https://docs.ansible.com/ansible-lint", |
490 | | - "source": "https://github.com/willthames/ansible-lint", |
| 489 | + "homepage": "https://ansible.readthedocs.io/projects/lint/", |
| 490 | + "source": "https://github.com/ansible/ansible-lint", |
491 | 491 | "pricing": null, |
492 | 492 | "plans": null, |
493 | 493 | "description": "Checks playbooks for practices and behaviour that could potentially be improved.", |
|
3498 | 3498 | "plans": null, |
3499 | 3499 | "description": "Static Code Analysis for R.", |
3500 | 3500 | "discussion": null, |
3501 | | - "deprecated": null, |
| 3501 | + "deprecated": true, |
3502 | 3502 | "resources": null, |
3503 | 3503 | "reviews": null, |
3504 | 3504 | "demos": null, |
|
3603 | 3603 | "demos": null, |
3604 | 3604 | "wrapper": null |
3605 | 3605 | }, |
3606 | | - "codeit-right": { |
3607 | | - "name": "CodeIt.Right", |
3608 | | - "categories": [ |
3609 | | - "linter" |
3610 | | - ], |
3611 | | - "languages": [ |
3612 | | - "csharp", |
3613 | | - "vbnet" |
3614 | | - ], |
3615 | | - "other": [], |
3616 | | - "licenses": [ |
3617 | | - "proprietary" |
3618 | | - ], |
3619 | | - "types": [ |
3620 | | - "cli" |
3621 | | - ], |
3622 | | - "homepage": "https://submain.com/products/codeit.right.aspx", |
3623 | | - "source": null, |
3624 | | - "pricing": "https://submain.com/CodeIt.Right/editions/", |
3625 | | - "plans": { |
3626 | | - "free": false, |
3627 | | - "oss": false |
3628 | | - }, |
3629 | | - "description": "CodeIt.Right™ provides a fast, automated way to ensure that your source code adheres to (your) predefined design and style guidelines as well as best coding practices.", |
3630 | | - "discussion": null, |
3631 | | - "deprecated": null, |
3632 | | - "resources": null, |
3633 | | - "reviews": null, |
3634 | | - "demos": null, |
3635 | | - "wrapper": null |
3636 | | - }, |
3637 | 3606 | "codelyzer": { |
3638 | 3607 | "name": "Codelyzer", |
3639 | 3608 | "categories": [ |
|
3716 | 3685 | "demos": null, |
3717 | 3686 | "wrapper": null |
3718 | 3687 | }, |
3719 | | - "codepeer": { |
3720 | | - "name": "Codepeer", |
3721 | | - "categories": [ |
3722 | | - "linter" |
3723 | | - ], |
3724 | | - "languages": [ |
3725 | | - "ada" |
3726 | | - ], |
3727 | | - "other": [], |
3728 | | - "licenses": [ |
3729 | | - "proprietary" |
3730 | | - ], |
3731 | | - "types": [ |
3732 | | - "cli" |
3733 | | - ], |
3734 | | - "homepage": "https://www.adacore.com/static-analysis/codepeer", |
3735 | | - "source": null, |
3736 | | - "pricing": "https://www.adacore.com/pricing", |
3737 | | - "plans": null, |
3738 | | - "description": "Detects run-time and logic errors.", |
3739 | | - "discussion": null, |
3740 | | - "deprecated": null, |
3741 | | - "resources": [ |
3742 | | - { |
3743 | | - "title": "What's New in CodePeer 19", |
3744 | | - "url": "https://www.youtube.com/watch?v=8837TUpLLMo" |
3745 | | - } |
3746 | | - ], |
3747 | | - "reviews": null, |
3748 | | - "demos": null, |
3749 | | - "wrapper": null |
3750 | | - }, |
3751 | 3688 | "codeql": { |
3752 | 3689 | "name": "codeql", |
3753 | 3690 | "categories": [ |
|
10911 | 10848 | "demos": null, |
10912 | 10849 | "wrapper": null |
10913 | 10850 | }, |
10914 | | - "ktool": { |
10915 | | - "name": "ktool", |
10916 | | - "categories": [ |
10917 | | - "linter" |
10918 | | - ], |
10919 | | - "languages": [], |
10920 | | - "other": [ |
10921 | | - "binary", |
10922 | | - "security" |
10923 | | - ], |
10924 | | - "licenses": [ |
10925 | | - "MIT" |
10926 | | - ], |
10927 | | - "types": [ |
10928 | | - "cli" |
10929 | | - ], |
10930 | | - "homepage": "https://ktool.cynder.me/en/latest/ktool.html", |
10931 | | - "source": "https://github.com/cxnder/ktool", |
10932 | | - "pricing": null, |
10933 | | - "plans": null, |
10934 | | - "description": "Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.", |
10935 | | - "discussion": null, |
10936 | | - "deprecated": null, |
10937 | | - "resources": null, |
10938 | | - "reviews": null, |
10939 | | - "demos": null, |
10940 | | - "wrapper": null |
10941 | | - }, |
10942 | 10851 | "kube-hunter": { |
10943 | 10852 | "name": "kube-hunter", |
10944 | 10853 | "categories": [ |
|
12193 | 12102 | "plans": null, |
12194 | 12103 | "description": "Format markdown code blocks using your favorite code formatters.", |
12195 | 12104 | "discussion": null, |
12196 | | - "deprecated": null, |
| 12105 | + "deprecated": false, |
12197 | 12106 | "resources": null, |
12198 | 12107 | "reviews": null, |
12199 | 12108 | "demos": null, |
|
12246 | 12155 | "ci", |
12247 | 12156 | "css", |
12248 | 12157 | "dockerfile", |
12249 | | - "formatter", |
12250 | 12158 | "gherkin", |
12251 | 12159 | "html", |
12252 | 12160 | "json", |
@@ -12929,10 +12837,11 @@ |
12929 | 12837 | "categories": [ |
12930 | 12838 | "linter" |
12931 | 12839 | ], |
12932 | | - "languages": [], |
12933 | | - "other": [ |
12934 | | - "formatter" |
| 12840 | + "languages": [ |
| 12841 | + "javascript", |
| 12842 | + "typescript" |
12935 | 12843 | ], |
| 12844 | + "other": [], |
12936 | 12845 | "licenses": [ |
12937 | 12846 | "Apache-2.0" |
12938 | 12847 | ], |
|
13868 | 13777 | "plans": null, |
13869 | 13778 | "description": "Facebook's tools for code analysis, visualizations, or style-preserving source transformation for many languages.", |
13870 | 13779 | "discussion": null, |
13871 | | - "deprecated": null, |
| 13780 | + "deprecated": true, |
13872 | 13781 | "resources": null, |
13873 | 13782 | "reviews": null, |
13874 | 13783 | "demos": null, |
|
17116 | 17025 | "demos": null, |
17117 | 17026 | "wrapper": null |
17118 | 17027 | }, |
17119 | | - "rezilion": { |
17120 | | - "name": "Rezilion", |
17121 | | - "categories": [ |
17122 | | - "linter" |
17123 | | - ], |
17124 | | - "languages": [], |
17125 | | - "other": [ |
17126 | | - "security" |
17127 | | - ], |
17128 | | - "licenses": [ |
17129 | | - "proprietary" |
17130 | | - ], |
17131 | | - "types": [ |
17132 | | - "service" |
17133 | | - ], |
17134 | | - "homepage": "https://www.rezilion.com/", |
17135 | | - "source": null, |
17136 | | - "pricing": null, |
17137 | | - "plans": null, |
17138 | | - "description": "Discovers vulnerabilities for all components in your environment, filters out 85% non-exploitable vulnerabilities and creates a remediation plan and open tickets to upgrade components that violate your security policy and/or patch automatically in CI.", |
17139 | | - "discussion": null, |
17140 | | - "deprecated": null, |
17141 | | - "resources": [ |
17142 | | - { |
17143 | | - "title": "Rezilion and CircleCI Integration Demo", |
17144 | | - "url": "https://www.youtube.com/watch?v=OIhfnVKq-MU" |
17145 | | - } |
17146 | | - ], |
17147 | | - "reviews": null, |
17148 | | - "demos": null, |
17149 | | - "wrapper": null |
17150 | | - }, |
17151 | 17028 | "rhabdomancer": { |
17152 | 17029 | "name": "rhabdomancer", |
17153 | 17030 | "categories": [ |
|
18117 | 17994 | "demos": null, |
18118 | 17995 | "wrapper": null |
18119 | 17996 | }, |
18120 | | - "searchdiggity": { |
18121 | | - "name": "SearchDiggity", |
18122 | | - "categories": [ |
18123 | | - "linter" |
18124 | | - ], |
18125 | | - "languages": [], |
18126 | | - "other": [ |
18127 | | - "security" |
18128 | | - ], |
18129 | | - "licenses": [ |
18130 | | - "proprietary" |
18131 | | - ], |
18132 | | - "types": [ |
18133 | | - "cli" |
18134 | | - ], |
18135 | | - "homepage": "https://resources.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/", |
18136 | | - "source": null, |
18137 | | - "pricing": null, |
18138 | | - "plans": null, |
18139 | | - "description": "Identifies vulnerabilities in open source code projects hosted on Github, Google Code, MS CodePlex, SourceForge, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, etc. ", |
18140 | | - "discussion": null, |
18141 | | - "deprecated": null, |
18142 | | - "resources": null, |
18143 | | - "reviews": null, |
18144 | | - "demos": null, |
18145 | | - "wrapper": null |
18146 | | - }, |
18147 | 17997 | "security-code-scan": { |
18148 | 17998 | "name": "Security Code Scan", |
18149 | 17999 | "categories": [ |
|
20519 | 20369 | "service", |
20520 | 20370 | "ide-plugin" |
20521 | 20371 | ], |
20522 | | - "homepage": "https://www.cqse.eu/en/teamscale/overview/", |
| 20372 | + "homepage": "https://teamscale.com", |
20523 | 20373 | "source": null, |
20524 | | - "pricing": "https://www.cqse.eu/en/teamscale/buy/", |
| 20374 | + "pricing": "https://teamscale.com/pricing", |
20525 | 20375 | "plans": { |
20526 | 20376 | "free": false, |
20527 | 20377 | "oss": false |
|
20580 | 20430 | "plans": null, |
20581 | 20431 | "description": "Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.", |
20582 | 20432 | "discussion": null, |
20583 | | - "deprecated": null, |
| 20433 | + "deprecated": true, |
20584 | 20434 | "resources": null, |
20585 | 20435 | "reviews": null, |
20586 | 20436 | "demos": null, |
|
0 commit comments