ESLint plugin to detect and prevent Trojan Source attacks from entering your codebase. This plugin is based on the library and command-line tool anti-trojan-source. It also inspired the creation of an anti-trojan rule in eslint-plugin-security.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A popular free security tool for automatically finding security vulnerabilities in web applications
A cloud-based web application firewall that provides protection against web attacks, DDoS mitigation, and performance optimization through CDN capabilities.
API Security is a comprehensive solution that provides continuous discovery, vulnerability assessment, threat detection, compliance monitoring, dynamic testing, and remediation capabilities to protect APIs against various threats and vulnerabilities.
Embeddable Yara library for Java with support for loading rules and scanning data.
Prevents you from committing passwords and other sensitive information to a git repository.
An Application Security Posture Management platform that helps organizations integrate security throughout the software development lifecycle with a focus on vulnerability management and secure coding practices.
A tool for brute-forcing GET and POST parameters to discover potential vulnerabilities in web applications.
Arnica is an application security platform that offers real-time scanning, risk mitigation, and management across various aspects of the software development lifecycle.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.