Reverse Dependencies of sarif-om
The following projects have a declared dependency on sarif-om:
- appsec-discovery — Discover sensitive objects in project code
- bandit — Security oriented static analyser for python code.
- bandit-sarif-formatter — A Bandit formatter for the Static Analysis Results Interchange Format (SARIF) Version 2.1.0 file format.
- cdmx-njsscan — njsscan is a SAST tool that can find insecure code patterns in your Node.js applications.
- cfn-lint — Checks CloudFormation templates for practices and behaviour that could potentially be improved
- dblinter — A static analysis tool for postgresql databases
- deepsecrets — A better tool for secrets search
- dfetch — Dependency fetcher
- eth-wake — Wake is a Python-based Solidity development and testing framework with built-in vulnerability detectors.
- flare-capa — The FLARE team's open-source tool to identify capabilities in executable files.
- iam-sarif-report — no summary
- joern2sarif — Utility script to convert joern/ocular json output to sarif.
- lemur — Certificate management and orchestration service
- ludvig — A simple vulnerability scanner
- mobsfscan — mobsfscan is a static analysis tool that can find insecure code patterns in your Android and iOS source code. Supports Java, Kotlin, Swift, and Objective C Code.
- njsscan — njsscan is a SAST tool that can find insecure code patterns in your Node.js applications.
- zreprt — ZAP-like reporting library
1