The purpose of this tool is to run a given set of YARA rules against the given node_module folder. With this approach, We can define YARA rules to identify suspicious scripts which are injected into node packages. Mainly inspired by these articles: Malicious packages in npm, Malicious NPM packages target Amazon, Slack with new dependency attacks, Hunting malicious NPM packages. This package can be added to the CI/CD pipeline. Software Requirements: Docker, Docker Compose, Makefile. How to use: Clone this repo, execute audit operation with `make` command, report available in `artifacts/output.json`.
Common questions about Audit Node Modules With YARA Rules including features, pricing, alternatives, and user reviews.
Audit Node Modules With YARA Rules is A tool to run YARA rules against node_module folders to identify suspicious scripts. It is a Application Security solution designed to help security teams with NPM, YARA, CI/CD.
Audit Node Modules With YARA Rules is a free Application Security tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/rpgeeganage/audit-node-modules-with-yara/ for download and installation instructions.
Popular alternatives to Audit Node Modules With YARA Rules include:
Compare these tools and more at https://cybersectools.com/categories/application-security
Audit Node Modules With YARA Rules is for security teams and organizations that need NPM, YARA, CI/CD, Supply Chain Security. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Application Security tools can be found at https://cybersectools.com/categories/application-security
SCA tool for code scanning, license identification, and SBOM generation
Malware detection across SDLC, DevOps pipelines, and open-source components
Software supply chain security platform with SCA, package firewall & threat intel
SCA tool for detecting vulnerabilities & license risks in open-source deps
Cloud-native SCA and SBOM platform for supply chain security across code to runtime