You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-4Lines changed: 6 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -1123,7 +1123,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
1123
1123
1124
1124
-[Railroader](https://railroader.org):warning: — An open source static analysis security vulnerability scanner for Ruby on Rails applications.
1125
1125
1126
-
-[rails_best_practices](https://rails-bestpractices.com):warning:— A code metric tool for Rails projects
1126
+
-[rails_best_practices](https://rails-bestpractices.com) — A code metric tool for Rails projects
1127
1127
1128
1128
-[reek](https://github.com/troessner/reek) — Code smell detector for Ruby.
1129
1129
@@ -1160,7 +1160,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
1160
1160
1161
1161
-[cargo-audit](https://rustsec.org) — Audit Cargo.lock for crates with security vulnerabilities reported to the [RustSec Advisory Database](https://github.com/RustSec/advisory-db/).
1162
1162
1163
-
-[cargo-bloat](https://github.com/RazrFalcon/cargo-bloat) — Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.
1163
+
-[cargo-bloat](https://github.com/RazrFalcon/cargo-bloat):warning:— Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.
1164
1164
1165
1165
-[cargo-breaking](https://github.com/iomentum/cargo-breaking) — cargo-breaking compares a crate's public API between two different branches, shows what changed, and suggests the next version according to semver.
1166
1166
@@ -1510,6 +1510,8 @@ It supports multiple languages and is designed to be extensible, allowing you to
1510
1510
1511
1511
-[Infer](https://fbinfer.com) — A static analyzer for Java, C and Objective-C
1512
1512
1513
+
-[keploy](https://keploy.io/) — Keploy is an open-source testing platform that helps developers automate and streamline their testing process. It provides API, and integration testing agents, generating tests, mocks/stubs for APIs that actually work. Additionally, Keploy offers an AI-powered Unit Testing Agent that generates stable, useful unit tests directly in your GitHub PRs and in VSCode, helping catch errors and improve code quality.
1514
+
1513
1515
-[Kiuwan](https://www.kiuwan.com/code-security-sast):copyright: — Identify and remediate cyber threats in a blazingly fast, collaborative environment, with seamless integration in your SDLC. Python, C\C++, Java, C#, PHP and more.
1514
1516
1515
1517
-[Klocwork](https://www.perforce.com/products/klocwork):copyright: — Quality and Security Static analysis for C/C++, Java and C#.
@@ -1708,7 +1710,7 @@ Loading address: binbloom can parse a raw binary firmware and determine its load
1708
1710
1709
1711
-[bloaty](https://github.com/google/bloaty) — Ever wondered what's making your binary big? Bloaty McBloatface will show you a size profile of the binary so you can understand what's taking up space inside. Bloaty performs a deep analysis of the binary. Using custom ELF, DWARF, and Mach-O parsers, Bloaty aims to accurately attribute every byte of the binary to the symbol or compileunit that produced it. It will even disassemble the binary looking for references to anonymous data. F
1710
1712
1711
-
-[cargo-bloat](https://github.com/RazrFalcon/cargo-bloat) — Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.
1713
+
-[cargo-bloat](https://github.com/RazrFalcon/cargo-bloat):warning:— Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.
1712
1714
1713
1715
-[cwe_checker](https://github.com/fkie-cad/cwe_checker) — cwe_checker finds vulnerable patterns in binary executables.
1714
1716
@@ -2220,7 +2222,7 @@ Kani verifies:
2220
2222
2221
2223
-[lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues
2222
2224
2223
-
-[LunaSec](https://github.com/marketplace/lunatrace-by-lunasec/) — Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.
2225
+
-[LunaSec](https://github.com/marketplace/lunatrace-by-lunasec/):warning:— Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.
2224
2226
2225
2227
-[njsscan](https://opensecurity.in) — A static application testing (SAST) tool that can find insecure code patterns in your node.js applications using simple pattern matcher from libsast and syntax-aware semantic code pattern search tool semgrep.
Copy file name to clipboardExpand all lines: data/api/tools.json
+48-3Lines changed: 48 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -1820,7 +1820,7 @@
1820
1820
"plans": null,
1821
1821
"description": "Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.",
1822
1822
"discussion": null,
1823
-
"deprecated": null,
1823
+
"deprecated": true,
1824
1824
"resources": null,
1825
1825
"reviews": null,
1826
1826
"demos": null,
@@ -10142,6 +10142,51 @@
10142
10142
"demos": null,
10143
10143
"wrapper": null
10144
10144
},
10145
+
"keploy": {
10146
+
"name": "keploy",
10147
+
"categories": [
10148
+
"linter"
10149
+
],
10150
+
"languages": [
10151
+
"csharp",
10152
+
"go",
10153
+
"java",
10154
+
"javascript",
10155
+
"python",
10156
+
"rust"
10157
+
],
10158
+
"other": [],
10159
+
"licenses": [
10160
+
"Apache-2.0 License"
10161
+
],
10162
+
"types": [
10163
+
"cli"
10164
+
],
10165
+
"homepage": "https://keploy.io/",
10166
+
"source": "https://github.com/keploy/",
10167
+
"pricing": null,
10168
+
"plans": null,
10169
+
"description": "Keploy is an open-source testing platform that helps developers automate and streamline their testing process. It provides API, and integration testing agents, generating tests, mocks/stubs for APIs that actually work. Additionally, Keploy offers an AI-powered Unit Testing Agent that generates stable, useful unit tests directly in your GitHub PRs and in VSCode, helping catch errors and improve code quality.",
"description": "Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.",
11297
11342
"discussion": null,
11298
-
"deprecated": null,
11343
+
"deprecated": true,
11299
11344
"resources": null,
11300
11345
"reviews": null,
11301
11346
"demos": null,
@@ -15799,7 +15844,7 @@
15799
15844
"plans": null,
15800
15845
"description": "A code metric tool for Rails projects",
0 commit comments