You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-[parallel-lint](https://github.com/php-parallel-lint/PHP-Parallel-Lint) — This tool checks syntax of PHP files faster than serial check with a fancier output.
851
849
852
850
-[Parse](https://github.com/psecio/parse) — A Static Security Scanner.
@@ -861,7 +859,7 @@ A ktfmt IntelliJ plugin is available from the plugin repository. To install it,
861
859
862
860
-[PHP Coding Standards Fixer](https://cs.symfony.com) — Fixes your code according to standards like PSR-1, PSR-2, and the Symfony standard.
863
861
864
-
-[PHP Insights](https://phpinsights.com) — Instant PHP quality checks from your console. Analysis of code quality and coding style as well as overview of code architecture and its complexity.
862
+
-[PHP Insights](https://github.com/nunomaduro/phpinsights) — Instant PHP quality checks from your console. Analysis of code quality and coding style as well as overview of code architecture and its complexity.
865
863
866
864
-[Php Inspections (EA Extended)](https://plugins.jetbrains.com/plugin/7622-php-inspections-ea-extended-) — A Static Code Analyzer for PHP.
867
865
@@ -1011,8 +1009,6 @@ It uses the pycodestyle utility to determine what parts of the code needs to be
1011
1009
1012
1010
-[pyanalyze](https://pyanalyze.readthedocs.io/en/latest/) — A tool for programmatically detecting common mistakes in Python code, such as references to undefined variables and type errors. It can be extended to add additional rules and perform checks specific to particular functions.
1013
1011
1014
-
-[PyCodeQual](https://pycodequ.al):copyright: — PyCodeQual gives you insights into complexity and bug risks. It adds automatic reviews to your pull requests.
1015
-
1016
1012
-[pycodestyle](https://pycodestyle.pycqa.org/en/latest) — (Formerly `pep8`) Check Python code against some of the style conventions in PEP 8.
1017
1013
1018
1014
-[pydocstyle](http://www.pydocstyle.org):warning: — Check compliance with Python docstring conventions.
@@ -1067,7 +1063,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
1067
1063
1068
1064
-[cyclocomp](https://github.com/MangoTheCat/cyclocomp) — Quantifies the cyclomatic complexity of R functions / expressions.
1069
1065
1070
-
-[goodpractice](https://mangothecat.github.io/goodpractice) — Analyses the source code for R packages and provides best-practice recommendations.
1066
+
-[goodpractice](https://docs.ropensci.org/goodpractice/) — Analyses the source code for R packages and provides best-practice recommendations.
1071
1067
1072
1068
-[lintr](https://github.com/jimhester/lintr) — Static Code Analysis for R.
1073
1069
@@ -1131,7 +1127,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
-[ruby-lint](http://code.yorickpeterse.com/ruby-lint/latest):warning: — Static code analysis for Ruby.
1130
+
-[ruby-lint](https://gitlab.com/yorickpeterse/ruby-lint):warning: — Static code analysis for Ruby.
1135
1131
1136
1132
-[rubycritic](https://github.com/whitesmith/rubycritic) — A Ruby code quality reporter.
1137
1133
@@ -1399,7 +1395,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1399
1395
1400
1396
-[Clayton](https://www.getclayton.com/):copyright: — AI-powered code reviews for Salesforce. Secure your developments, enforce best practice and control your technical debt in real-time.
1401
1397
1402
-
-[coala](https://coala.io):warning: — Language independent framework for creating code analysis - supports [over 60 languages](https://coala.io/languages) by default.
1398
+
-[coala](https://github.com/coala/coala):warning: — Language independent framework for creating code analysis - supports [over 60 languages](https://coala.io/languages) by default.
@@ -1421,8 +1417,6 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1421
1417
1422
1418
-[Codemodder](https://codemodder.io/) — Codemodder is a pluggable framework for building expressive codemods. Use Codemodder when you need more than a linter or code formatting tool. Use it to fix non-trivial security issues and other code quality problems.
1423
1419
1424
-
-[CodePatrol](https://cyber-security.claranet.fr/en/codepatrol):copyright: — Automated SAST code reviews driven by security, supports 15+ languages and includes security training.
1425
-
1426
1420
-[codeql](https://github.com/github/codeql) — Deep code analysis - semantic queries and dataflow for several languages with VSCode plugin support.
1427
1421
1428
1422
-[CodeQue](https://codeque.co) — Ecosystem for structural matching JavaScript and TypeScript code. Offers search tool that understands code structure. Available as CLI tool and Visual Studio Code extension. It helps to search code faster and more accurately making you workflow more effective. Soon it will offer ESLint plugin to create your own rules in minutes to help with assuring codebase quality.
@@ -1449,7 +1443,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1449
1443
1450
1444
-[cqc](https://github.com/xcatliu/cqc):warning: — Check your code quality for js, jsx, vue, css, less, scss, sass and styl files.
1451
1445
1452
-
-[DeepCode](https://www.deepcode.ai):warning::copyright: — DeepCode was acquired by Snyk is now Snyk Code.
1446
+
-[DeepCode](https://snyk.io/platform/deepcode-ai/):warning::copyright: — DeepCode was acquired by Snyk is now Snyk Code.
1453
1447
1454
1448
-[DeepSource](https://deepsource.com):copyright: — In-depth static analysis to find issues in verticals of bug risks, security, anti-patterns, performance, documentation and style. Native integrations with GitHub, GitLab and Bitbucket. Less than 5% false positives.
1455
1449
@@ -1631,7 +1625,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1631
1625
1632
1626
-[weggli](https://github.com/googleprojectzero/weggli) — A fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.
1633
1627
1634
-
-[WhiteHat Application Security Platform](https://www.whitehatsec.com/platform/static-application-security-testing):copyright: — WhiteHat Scout (for Developers) combined with WhiteHat Sentinel Source (for Operations) supporting WhiteHat Top 40 and OWASP Top 10.
1628
+
-[WhiteHat Application Security Platform](https://source.whitehatsec.com/help/sentinel/sast-service-detail.html):copyright: — WhiteHat Scout (for Developers) combined with WhiteHat Sentinel Source (for Operations) supporting WhiteHat Top 40 and OWASP Top 10.
1635
1629
1636
1630
-[Wotan](https://github.com/fimbullinter/wotan):warning: — Pluggable TypeScript and JavaScript linter.
1637
1631
@@ -1665,7 +1659,7 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1665
1659
-[alquitran](https://github.com/ferivoz/alquitran) — Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations.
1666
1660
This project is intended to be used by maintainers of projects who want to offer portable source code archives for as many systems as possible. Checking tar archives with alquitran before publishing them should help spotting issues before they reach distributors and users.
1667
1661
1668
-
-[packj](https://packj.dev) — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1662
+
-[packj](https://github.com/ossillate-inc/packj) — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.
1669
1663
1670
1664
-[pure](https://github.com/ronomon/pure):warning: — Pure is a static analysis file format checker that checks ZIP files for dangerous compression ratios, spec deviations, malicious archive signatures, mismatching local and central directory headers, ambiguous UTF-8 filenames, directory and symlink traversals, invalid MS-DOS dates, overlapping headers, overflow, underflow, sparseness, accidental buffer bleeds etc.
1671
1665
@@ -1875,8 +1869,6 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1875
1869
1876
1870
-[Goblint](https://goblint.in.tum.de) — A static analyzer for the analysis of multi-threaded C programs. Its primary focus is the detection of data races, but it also reports other runtime errors, such as buffer overflows and null-pointer dereferences.
-[PullRequest](https://www.pullrequest.com):copyright: — Code review as a service with built-in static analysis. Increase velocity and reduce technical debt through quality code review by expert engineers backed by best-in-class automation.
1881
1873
1882
1874
-[quality](https://github.com/apiology/quality):warning: — Runs quality checks on your code using community tools, and makes sure your numbers don't get any worse over time.
@@ -2068,7 +2060,7 @@ but with the following improvements:
2068
2060
<h2>Mobile</h2>
2069
2061
2070
2062
2071
-
-[Android Lint](http://tools.android.com/tips/lint) — Run static analysis on Android projects.
2063
+
-[Android Lint](https://developer.android.com/studio/write/lint) — Run static analysis on Android projects.
2072
2064
2073
2065
-[android-lint-summary](https://passy.github.io/android-lint-summary):warning: — Combines lint errors of multiple projects into one output, check lint results of multiple sub-projects at once.
2074
2066
@@ -2206,7 +2198,7 @@ Kani verifies:
2206
2198
2207
2199
-[lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues
2208
2200
2209
-
-[LunaSec](https://www.lunasec.io) — Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.
2201
+
-[LunaSec](https://github.com/marketplace/lunatrace-by-lunasec/) — Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.
2210
2202
2211
2203
-[njsscan](https://opensecurity.in) — A static application testing (SAST) tool that can find insecure code patterns in your node.js applications using simple pattern matcher from libsast and syntax-aware semantic code pattern search tool semgrep.
0 commit comments