The purpose of this tool is to run a given set of YARA rules against the given node_module folder. With this approach, We can define YARA rules to identify suspicious scripts which are injected into node packages. Mainly inspired by these articles: Malicious packages in npm, Malicious NPM packages target Amazon, Slack with new dependency attacks, Hunting malicious NPM packages. This package can be added to the CI/CD pipeline. Software Requirements: Docker, Docker Compose, Makefile. How to use: Clone this repo, execute audit operation with `make` command, report available in `artifacts/output.json`.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Open source web application security scanner with 200+ vulnerability identification capabilities.
Nmap is an essential network scanning tool used for network security auditing and status monitoring.
Web inventory tool that captures screenshots of webpages and includes additional features for enhanced usability.
Check for known vulnerabilities in your Node.js installation.
A tool that finds unprotected secrets in container images or file systems, matching against a database of 140 secret types.
A tool for detecting and exploiting vulnerabilities in web applications
Open source security auditing tool to search and dump system configuration.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.