Skip to content

⚙️ A curated list of static analysis (SAST) tools and linters for all programming languages, config files, build tools, and more. The focus is on tools which improve code quality.

License

Notifications You must be signed in to change notification settings

analysis-tools-dev/static-analysis

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Analysis Tools Website

This repository lists static analysis tools for all programming languages, build tools, config files and more. The focus is on tools which improve code quality such as linters and formatters. The official website, analysis-tools.dev is based on this repository and adds rankings, user comments, and additional resources like videos for each tool.

Website CI

Sponsors

This project would not be possible without the generous support of our sponsors.

BugProve Betterscan Pixee

If you also want to support this project, head over to our Github sponsors page.

Meaning of Symbols:

  • ©️ stands for proprietary software. All other tools are Open Source.
  • ℹ️ indicates that the community does not recommend to use this tool for new projects anymore. The icon links to the discussion issue.
  • ⚠️ means that this tool was not updated for more than 1 year, or the repo was archived.

Pull requests are very welcome!
Also check out the sister project, awesome-dynamic-analysis.

Table of Contents

Show Other

Programming Languages

  • abaplint — Linter for ABAP, written in TypeScript.

  • abapOpenChecks — Enhances the SAP Code Inspector with new and customizable checks.

  • Codepeer ©️ — Detects run-time and logic errors.

  • Polyspace for Ada ©️ — Provide code verification that proves the absence of overflow, divide-by-zero, out-of-bounds array access, and certain other run-time errors in source code.

  • SPARK ©️ — Static analysis and formal verification toolset for Ada.

  • STOKE ⚠️ — A programming-language agnostic stochastic optimizer for the x86_64 instruction set. It uses random search to explore the extremely high-dimensional space of all possible program transformations.
  • gawk --lint — Warns about constructs that are dubious or nonportable to other awk implementations.
  • Astrée ©️ — Astrée automatically proves the absence of runtime errors and invalid con­current behavior in C/C++ applications. It is sound for floating-point computations, very fast, and exceptionally precise. The analyzer also checks for MISRA/CERT/CWE/Adaptive Autosar coding rules and supports qualification for ISO 26262, DO-178C level A, and other safety standards. Jenkins and Eclipse plugins are available.

  • CBMC — Bounded model-checker for C programs, user-defined assertions, standard assertions, several coverage metric analyses.

  • clang-tidy — Clang-based C++ linter tool with the (limited) ability to fix issues, too.

  • clazy — Qt-oriented static code analyzer based on the Clang framework. clazy is a compiler plugin which allows clang to understand Qt semantics. You get more than 50 Qt related compiler warnings, ranging from unneeded memory allocations to misusage of API, including fix-its for automatic refactoring.

  • CMetrics — Measures size and complexity for C files.

  • CPAchecker — A tool for configurable software verification of C programs. The name CPAchecker was chosen to reflect that the tool is based on the CPA concepts and is used for checking software programs.

  • cppcheck — Static analysis of C/C++ code.

  • CppDepend ©️ — Measure, query and visualize your code and avoid unexpected issues, technical debt and complexity.

  • cpplint — Automated C++ checker that follows Google's style guide.

  • cqmetrics — Quality metrics for C code.

  • CScout — Complexity and quality metrics for C and C preprocessor code.

  • ENRE-cpp — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-cpp is a ENtity Relationship Extractor for C/C++ based on @eclipse/CDT. (Under development)

  • ESBMC — ESBMC is an open source, permissively licensed, context-bounded model checker based on satisfiability modulo theories for the verification of single- and multi-threaded C/C++ programs.

  • flawfinder ⚠️ — Finds possible security weaknesses.

  • flint++ ⚠️ — Cross-platform, zero-dependency port of flint, a lint program for C++ developed and used at Facebook.

  • Frama-C — A sound and extensible static analyzer for C code.

  • GCC — The GCC compiler has static analysis capabilities since version 10. This option is only available if GCC was configured with analyzer support enabled. It can also output its diagnostics to a JSON file in the SARIF format (from v13).

  • Goblint — A static analyzer for the analysis of multi-threaded C programs. Its primary focus is the detection of data races, but it also reports other runtime errors, such as buffer overflows and null-pointer dereferences.

  • Helix QAC ©️ — Enterprise-grade static analysis for embedded software. Supports MISRA, CERT, and AUTOSAR coding standards.

  • IKOS — A sound static analyzer for C/C++ code based on LLVM.

  • Joern — Open-source code analysis platform for C/C++ based on code property graphs

  • KLEE — A dynamic symbolic execution engine built on top of the LLVM compiler infrastructure. It can auto-generate test cases for programs such that the test cases exercise as much of the program as possible.

  • LDRA ©️ — A tool suite including static analysis (TBVISION) to various standards including MISRA C & C++, JSF++ AV, CWE, CERT C, CERT C++ & Custom Rules.

  • MATE ⚠️ — A suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code. MATE unifies application-specific and low-level vulnerability analysis using code property graphs (CPGs), enabling the discovery of highly application-specific vulnerabilities that depend on both implementation details and the high-level semantics of target C/C++ programs.

  • PC-lint ©️ — Static analysis for C/C++. Runs natively under Windows/Linux/MacOS. Analyzes code for virtually any platform, supporting C11/C18 and C++17.

  • Phasar — A LLVM-based static analysis framework which comes with a taint and type state analysis.

  • Polyspace Bug Finder ©️ — Identifies run-time errors, concurrency issues, security vulnerabilities, and other defects in C and C++ embedded software.

  • Polyspace Code Prover ©️ — Provide code verification that proves the absence of overflow, divide-by-zero, out-of-bounds array access, and certain other run-time errors in C and C++ source code.

  • scan-build — Frontend to drive the Clang Static Analyzer built into Clang via a regular build.

  • splint — Annotation-assisted static program checker.

  • SVF — A static tool that enables scalable and precise interprocedural dependence analysis for C and C++ programs.

  • TrustInSoft Analyzer ©️ — Exhaustive detection of coding errors and their associated security vulnerabilities. This encompasses a sound undefined behavior detection (buffer overflows, out-of-bounds array accesses, null-pointer dereferences, use-after-free, divide-by-zeros, uninitialized memory accesses, signed overflows, invalid pointer arithmetic, etc.), data flow and control flow verification as well as full functional verification of formal specifications. All versions of C up to C18 and C++ up to C++20 are supported. TrustInSoft Analyzer will acquire ISO 26262 qualification in Q2'2023 (TCL3). A MISRA C checker is also bundled.

  • vera++ ⚠️ — Vera++ is a programmable tool for verification, analysis and transformation of C++ source code.

  • .NET Analyzers — An organization for the development of analyzers (diagnostics and code fixes) using the .NET Compiler Platform.

  • ArchUnitNET — A C# architecture test library to specify and assert architecture rules in C# for automated testing.

  • code-cracker — An analyzer library for C# and VB that uses Roslyn to produce refactorings, code analysis, and other niceties.

  • CSharpEssentials ⚠️ — C# Essentials is a collection of Roslyn diagnostic analyzers, code fixes and refactorings that make it easy to work with C# 6 language features.

  • Designite ©️ — Designite supports detection of various architecture, design, and implementation smells, computation of various code quality metrics, and trend analysis.

  • Gendarme — Gendarme inspects programs and libraries that contain code in ECMA CIL format (Mono and .NET).

  • Infer# ⚠️ — InferSharp (also referred to as Infer#) is an interprocedural and scalable static code analyzer for C#. Via the capabilities of Facebook's Infer, this tool detects null pointer dereferences and resource leaks.

  • Meziantou.Analyzer — A Roslyn analyzer to enforce some good practices in C# in terms of design, usage, security, performance, and style.

  • NDepend ©️ — Measure, query and visualize your code and avoid unexpected issues, technical debt and complexity.

  • Puma Scan — Puma Scan provides real time secure code analysis for common vulnerabilities (XSS, SQLi, CSRF, LDAPi, crypto, deserialization, etc.) as development teams write code in Visual Studio.

  • Roslynator — A collection of 190+ analyzers and 190+ refactorings for C#, powered by Roslyn.

  • SonarAnalyzer.CSharp — These Roslyn analyzers allow you to produce Clean Code that is safe, reliable, and maintainable by helping you find and correct bugs, vulnerabilities, and code smells in your codebase.

  • VSDiagnostics ⚠️ — A collection of static analyzers based on Roslyn that integrates with VS.

  • Wintellect.Analyzers — .NET Compiler Platform ("Roslyn") diagnostic analyzers and code fixes.

  • Astrée ©️ — Astrée automatically proves the absence of runtime errors and invalid con­current behavior in C/C++ applications. It is sound for floating-point computations, very fast, and exceptionally precise. The analyzer also checks for MISRA/CERT/CWE/Adaptive Autosar coding rules and supports qualification for ISO 26262, DO-178C level A, and other safety standards. Jenkins and Eclipse plugins are available.

  • CBMC — Bounded model-checker for C programs, user-defined assertions, standard assertions, several coverage metric analyses.

  • clang-tidy — Clang-based C++ linter tool with the (limited) ability to fix issues, too.

  • clazy — Qt-oriented static code analyzer based on the Clang framework. clazy is a compiler plugin which allows clang to understand Qt semantics. You get more than 50 Qt related compiler warnings, ranging from unneeded memory allocations to misusage of API, including fix-its for automatic refactoring.

  • CMetrics — Measures size and complexity for C files.

  • cppcheck — Static analysis of C/C++ code.

  • CppDepend ©️ — Measure, query and visualize your code and avoid unexpected issues, technical debt and complexity.

  • cpplint — Automated C++ checker that follows Google's style guide.

  • cqmetrics — Quality metrics for C code.

  • CScout — Complexity and quality metrics for C and C preprocessor code.

  • ENRE-cpp — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-cpp is a ENtity Relationship Extractor for C/C++ based on @eclipse/CDT. (Under development)

  • ESBMC — ESBMC is an open source, permissively licensed, context-bounded model checker based on satisfiability modulo theories for the verification of single- and multi-threaded C/C++ programs.

  • flawfinder ⚠️ — Finds possible security weaknesses.

  • flint++ ⚠️ — Cross-platform, zero-dependency port of flint, a lint program for C++ developed and used at Facebook.

  • Frama-C — A sound and extensible static analyzer for C code.

  • Helix QAC ©️ — Enterprise-grade static analysis for embedded software. Supports MISRA, CERT, and AUTOSAR coding standards.

  • IKOS — A sound static analyzer for C/C++ code based on LLVM.

  • Joern — Open-source code analysis platform for C/C++ based on code property graphs

  • KLEE — A dynamic symbolic execution engine built on top of the LLVM compiler infrastructure. It can auto-generate test cases for programs such that the test cases exercise as much of the program as possible.

  • LDRA ©️ — A tool suite including static analysis (TBVISION) to various standards including MISRA C & C++, JSF++ AV, CWE, CERT C, CERT C++ & Custom Rules.

  • MATE ⚠️ — A suite of tools for interactive program analysis with a focus on hunting for bugs in C and C++ code. MATE unifies application-specific and low-level vulnerability analysis using code property graphs (CPGs), enabling the discovery of highly application-specific vulnerabilities that depend on both implementation details and the high-level semantics of target C/C++ programs.

  • PC-lint ©️ — Static analysis for C/C++. Runs natively under Windows/Linux/MacOS. Analyzes code for virtually any platform, supporting C11/C18 and C++17.

  • Phasar — A LLVM-based static analysis framework which comes with a taint and type state analysis.

  • Polyspace Bug Finder ©️ — Identifies run-time errors, concurrency issues, security vulnerabilities, and other defects in C and C++ embedded software.

  • Polyspace Code Prover ©️ — Provide code verification that proves the absence of overflow, divide-by-zero, out-of-bounds array access, and certain other run-time errors in C and C++ source code.

  • scan-build — Frontend to drive the Clang Static Analyzer built into Clang via a regular build.

  • splint — Annotation-assisted static program checker.

  • SVF — A static tool that enables scalable and precise interprocedural dependence analysis for C and C++ programs.

  • TrustInSoft Analyzer ©️ — Exhaustive detection of coding errors and their associated security vulnerabilities. This encompasses a sound undefined behavior detection (buffer overflows, out-of-bounds array accesses, null-pointer dereferences, use-after-free, divide-by-zeros, uninitialized memory accesses, signed overflows, invalid pointer arithmetic, etc.), data flow and control flow verification as well as full functional verification of formal specifications. All versions of C up to C18 and C++ up to C++20 are supported. TrustInSoft Analyzer will acquire ISO 26262 qualification in Q2'2023 (TCL3). A MISRA C checker is also bundled.

  • vera++ ⚠️ — Vera++ is a programmable tool for verification, analysis and transformation of C++ source code.

  • clj-kondo — A linter for Clojure code that sparks joy. It informs you about potential errors while you are typing.
  • coffeelint ⚠️ — A style checker that helps keep CoffeeScript code clean and consistent.
  • Fixinator ©️ — Static security code analysis for ColdFusion or CFML code. Designed to work within a CI pipeline or from the developers terminal.
  • ameba — A static code analysis tool for Crystal.

  • crystal — The Crystal compiler has built-in linting functionality.

  • Dart Code Metrics ⚠️ — Additional linter for Dart. Reports code metrics, checks for anti-patterns and provides additional rules for Dart analyzer.

  • effective_dart — Linter rules corresponding to the guidelines in Effective Dart

  • lint — An opinionated, community-driven set of lint rules for Dart and Flutter projects. Like pedantic but stricter

  • Linter for dart — Style linter for Dart.

  • DelphiLint — A Delphi IDE package providing on-the-fly code analysis and linting, powered by SonarDelphi.

  • Fix Insight ©️ — A free IDE Plugin for static code analysis. A Pro edition includes a command line tool for automation purposes.

  • Pascal Analyzer ©️ — A static code analysis tool with numerous reports. A free Lite version is available with limited reporting.

  • Pascal Expert ©️ — IDE plugin for code analysis. Includes a subset of Pascal Analyzer reporting capabilities and is available for Delphi versions 2007 and later.

  • SonarDelphi — Delphi static analyzer for the SonarQube code quality platform.

  • D-scanner — D-Scanner is a tool for analyzing D source code.
  • credo — A static code analysis tool with a focus on code consistency and teaching.

  • dialyxir — Mix tasks to simplify use of Dialyzer in Elixir projects.

  • sobelow — Security-focused static analysis for the Phoenix Framework.

  • elm-analyse ⚠️ — A tool that allows you to analyse your Elm code, identify deficiencies and apply best practices.

  • elm-review — Analyzes whole Elm projects, with a focus on shareable and custom rules written in Elm that add guarantees the Elm compiler doesn't give you.

  • dialyzer — The DIALYZER, a DIscrepancy AnaLYZer for ERlang programs. Dialyzer is a static analysis tool that identifies software discrepancies, such as definite type errors, code that has become dead or unreachable because of programming error, and unnecessary tests, in single Erlang modules or entire (sets of) applications. Dialyzer starts its analysis from either debug-compiled BEAM bytecode or from Erlang source code. The file and line number of a discrepancy is reported along with an indication of what the discrepancy is about. Dialyzer bases its analysis on the concept of success typings, which allows for sound warnings (no false positives).

  • elvis — Erlang Style Reviewer.

  • Primitive Erlang Security Tool (PEST) — A tool to do a basic scan of Erlang source code and report any function calls that may cause Erlang source code to be insecure.

  • fprettify — Auto-formatter for modern fortran source code, written in Python. Fprettify is a tool that provides consistent whitespace, indentation, and delimiter alignment in code, including the ability to change letter case and handle preprocessor directives, all while preserving revision history and tested for editor integration.

  • i-Code CNES for Fortran — An open source static code analysis tool for Fortran 77, Fortran 90 and Shell.

  • aligncheck — Find inefficiently packed structs.

  • bodyclose — Checks whether HTTP response body is closed.

  • deadcode — Finds unused code.

  • dingo-hunter ⚠️ — Static analyser for finding deadlocks in Go.

  • dogsled — Finds assignments/declarations with too many blank identifiers.

  • dupl ⚠️ — Reports potentially duplicated code.

  • errcheck — Check that error return values are used.

  • errwrap — Wrap and fix Go errors with the new %w verb directive. This tool analyzes fmt.Errorf() calls and reports calls that contain a verb directive that is different than the new %w verb directive introduced in Go v1.13. It's also capable of rewriting calls to use the new %w wrap verb directive.

  • flen — Get info on length of functions in a Go package.

  • Go Meta Linter ⚠️ — Concurrently run Go lint tools and normalise their output. Use golangci-lint for new projects.

  • go tool vet --shadow — Reports variables that may have been unintentionally shadowed.

  • go vet — Examines Go source code and reports suspicious.

  • go-consistent — Analyzer that helps you to make your Go programs more consistent.

  • go-critic — Go source code linter that maintains checks which are currently not implemented in other linters.

  • go/ast — Package ast declares the types used to represent syntax trees for Go packages.

  • goast ⚠️ — Go AST (Abstract Syntax Tree) based static analysis tool with Rego.

  • gochecknoglobals ⚠️ — Checks that no globals are present.

  • goconst — Finds repeated strings that could be replaced by a constant.

  • gocyclo ⚠️ — Calculate cyclomatic complexities of functions in Go source code.

  • gofmt -s — Checks if the code is properly formatted and could not be further simplified.

  • gofumpt — Enforce a stricter format than gofmt, while being backwards-compatible. That is, gofumpt is happy with a subset of the formats that gofmt is happy with. The tool is a fork of gofmt as of Go 1.19, and requires Go 1.18 or later. It can be used as a drop-in replacement to format your Go code, and running gofmt after gofumpt should produce no changes. gofumpt will never add rules which disagree with gofmt formatting. So we extend gofmt rather than compete with it.

  • goimports — Checks missing or unreferenced package imports.

  • gokart — Golang security analysis with a focus on minimizing false positives. It is capable of tracing the source of variables and function arguments to determine whether input sources are safe.

  • GolangCI-Lint — Alternative to Go Meta Linter: GolangCI-Lint is a linters aggregator.

  • golint — Prints out coding style mistakes in Go source code.

  • goreporter — Concurrently runs many linters and normalises their output to a report.

  • goroutine-inspect — An interactive tool to analyze Golang goroutine dump.

  • gosec (gas) — Inspects source code for security problems by scanning the Go AST.

  • gotype — Syntactic and semantic analysis similar to the Go compiler.

  • govulncheck — Govulncheck reports known vulnerabilities that affect Go code. It uses static analysis of source code or a binary's symbol table to narrow down reports to only those that could affect the application. By default, govulncheck makes requests to the Go vulnerability database at https://vuln.go.dev. Requests to the vulnerability database contain only module paths, not code or other properties of your program.

  • ineffassign — Detect ineffectual assignments in Go code.

  • interfacer ⚠️ — Suggest narrower interfaces that can be used.

  • lll ⚠️ — Report long lines.

  • maligned ⚠️ — Detect structs that would take less memory if their fields were sorted.

  • misspell — Finds commonly misspelled English words.

  • nakedret — Finds naked returns.

  • nargs — Finds unused arguments in function declarations.

  • prealloc — Finds slice declarations that could potentially be preallocated.

  • Reviewdog — A tool for posting review comments from any linter in any code hosting service.

  • revive — Fast, configurable, extensible, flexible, and beautiful linter for Go. Drop-in replacement of golint.

  • safesql ⚠️ — Static analysis tool for Golang that protects against SQL injections.

  • shisho ⚠️ — A lightweight static code analyzer designed for developers and security teams. It allows you to analyze and transform source code with an intuitive DSL similar to sed, but for code.

  • staticcheck — Go static analysis that specialises in finding bugs, simplifying code and improving performance.

  • structcheck — Find unused struct fields.

  • structslop — Static analyzer for Go that recommends struct field rearrangements to provide for maximum space/allocation efficiency

  • test — Show location of test failures from the stdlib testing module.

  • unconvert ⚠️ — Detect redundant type conversions.

  • unparam — Find unused function parameters.

  • varcheck — Find unused global variables and constants.

  • wsl — Enforces empty lines at the right places.

  • CodeNarc — A static analysis tool for Groovy source code, enabling monitoring and enforcement of many coding standards and best practices.
  • brittany ⚠️ — Haskell source code formatter

  • HLint — HLint is a tool for suggesting possible improvements to Haskell code.

  • Liquid Haskell — Liquid Haskell is a refinement type checker for Haskell programs.

  • Stan — Stan is a command-line tool for analysing Haskell projects and outputting discovered vulnerabilities in a helpful way with possible solutions for detected problems.

  • Weeder — A tool for detecting dead exports or package imports in Haskell code.

  • Haxe Checkstyle — A static analysis tool to help developers write Haxe code that adheres to a coding standard.
  • Checker Framework — Pluggable type-checking for Java. This is not just a bug-finder, but a verification tool that gives a guarantee of correctness. It comes with 27 pre-built type systems, and it enables users to define their own type system; the manual lists over 30 user-contributed type systems.

  • checkstyle — Checking Java source code for adherence to a Code Standard or set of validation rules (best practices).

  • ck — Calculates Chidamber and Kemerer object-oriented metrics by processing the source Java files.

  • ckjm — Calculates Chidamber and Kemerer object-oriented metrics by processing the bytecode of compiled Java files.

  • CogniCrypt — Checks Java source and byte code for incorrect uses of cryptographic APIs.

  • Dataflow Framework — An industrial-strength dataflow framework for Java. The Dataflow Framework is used in the Checker Framework, Google’s Error Prone, Uber’s NullAway, Meta’s Nullsafe, and in other contexts. It is distributed with the Checker Framework.

  • DesigniteJava ©️ — DesigniteJava supports detection of various architecture, design, and implementation smells along with computation of various code quality metrics.

  • Diffblue ©️ — Diffblue is a software company that provides AI-powered code analysis and testing solutions for software development teams. Its technology helps developers automate testing, find bugs, and reduce manual labor in their software development processes. The company's main product, Diffblue Cover, uses AI to generate and run unit tests for Java code, helping to catch errors and improve code quality.

  • Doop — Doop is a declarative framework for static analysis of Java/Android programs, centered on pointer analysis algorithms. Doop provides a large variety of analyses and also the surrounding scaffolding to run an analysis end-to-end (fact generation, processing, statistics, etc.).

  • ENRE-java — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-java is a ENtity Relationship Extractor for Java projects based on @Eclipse JDT/parser.

  • Error Prone — Catch common Java mistakes as compile-time errors.

  • fb-contrib — A plugin for FindBugs with additional bug detectors.

  • forbidden-apis — Detects and forbids invocations of specific method/class/field (like reading from a text stream without a charset). Maven/Gradle/Ant compatible.

  • google-java-format — Reformats Java source code to comply with Google Java Style

  • HuntBugs ⚠️ — Bytecode static analyzer tool based on Procyon Compiler Tools aimed to supersede FindBugs.

  • IntelliJ IDEA ©️ — Comes bundled with a lot of inspections for Java and Kotlin and includes tools for refactoring, formatting and more.

  • JArchitect ©️ — Measure, query and visualize your code and avoid unexpected issues, technical debt and complexity.

  • JBMC — Bounded model-checker for Java (bytecode), verifies user-defined assertions, standard assertions, several coverage metric analyses.

  • Mariana Trench — Our security focused static analysis tool for Android and Java applications. Mariana Trench analyzes Dalvik bytecode and is built to run fast on large codebases (10s of millions of lines of code). It can find vulnerabilities as code changes, before it ever lands in your repository.

  • NullAway — Type-based null-pointer checker with low build-time overhead; an Error Prone plugin.

  • OWASP Dependency Check — Checks dependencies for known, publicly disclosed, vulnerabilities.

  • qulice — Combines a few (pre-configured) static analysis tools (checkstyle, PMD, Findbugs, ...).

  • RefactorFirst — Identifies and prioritizes God Classes and Highly Coupled classes in Java codebases you should refactor first.

  • Soot — A framework for analyzing and transforming Java and Android applications.

  • Spoon — Spoon is a metaprogramming library to analyze and transform Java source code (incl Java 9, 10, 11, 12, 13, 14). It parses source files to build a well-designed AST with powerful analysis and transformation API. Can be integrated in Maven and Gradle.

  • SpotBugs — SpotBugs is FindBugs' successor. A tool for static analysis to look for bugs in Java code.

  • steady — Analyses your Java applications for open-source dependencies with known vulnerabilities, using both static analysis and testing to determine code context and usage for greater accuracy.

  • Violations Lib — Java library for parsing report files from static code analysis. Used by a bunch of Jenkins, Maven and Gradle plugins.

  • aether ⚠️ — Lint, analyze, normalize, transform, sandbox, run, step through, and visualize user JavaScript, in node or the browser.

  • Closure Compiler — A compiler tool to increase efficiency, reduce size, and provide code warnings in JavaScript files.

  • ClosureLinter ⚠️ — Ensures that all of your project's JavaScript code follows the guidelines in the Google JavaScript Style Guide. It can also automatically fix many common errors.

  • complexity-report ⚠️ — Software complexity analysis for JavaScript projects.

  • DeepScan ©️ — An analyzer for JavaScript which targets runtime errors and quality issues rather than coding conventions.

  • es6-plato ⚠️ — Visualize JavaScript (ES6) source complexity.

  • escomplex ⚠️ — Software complexity analysis of JavaScript-family abstract syntax trees.

  • Esprima ⚠️ — ECMAScript parsing infrastructure for multipurpose analysis.

  • flow — A static type checker for JavaScript.

  • hegel — A static type checker for JavaScript with a bias on type inference and strong type systems.

  • jshint ℹ️ — Detect errors and potential problems in JavaScript code and enforce your team's coding conventions.

  • JSLint ℹ️ — The JavaScript Code Quality Tool.

  • JSPrime ⚠️ — Static security analysis tool.

  • NodeJSScan ⚠️ — A static security code scanner for Node.js applications powered by libsast and semgrep that builds on the njsscan cli tool. It features a UI with various dashboards about an application's security status.

  • plato ⚠️ — Visualize JavaScript source complexity.

  • Polymer-analyzer — A static analysis framework for Web Components.

  • retire.js — Scanner detecting the use of JavaScript libraries with known vulnerabilities.

  • RSLint ⚠️ — A (WIP) JavaScript linter written in Rust designed to be as fast as possible, customizable, and easy to use.

  • standard — An npm module that checks for Javascript Styleguide issues.

  • tern — A JavaScript code analyzer for deep, cross-editor language support.

  • TypL ⚠️ — With TypL, you just write completely standard JS, and the tool figures out your types via powerful inferencing.

  • xo — Opinionated but configurable ESLint wrapper with lots of goodies included. Enforces strict and readable code.

  • yardstick ⚠️ — Javascript code metrics.

  • JET — Static type inference system to detect bugs and type instabilities.

  • StaticLint — Static Code Analysis for Julia

  • detekt — Static code analysis for Kotlin code.

  • diktat — Strict coding standard for Kotlin and a linter that detects and auto-fixes code smells.

  • ktfmt — A program that reformats Kotlin source code to comply with the common community standard for Kotlin code conventions. A ktfmt IntelliJ plugin is available from the plugin repository. To install it, go to your IDE's settings and select the Plugins category. Click the Marketplace tab, search for the ktfmt plugin, and click the Install button.

  • ktlint — An anti-bikeshedding Kotlin linter with built-in formatter.

  • luacheck — A tool for linting and static analysis of Lua code.

  • lualint — lualint performs luac-based static analysis of global variable usage in Lua source code.

  • Luanalysis — An IDE for statically typed Lua development.

  • mlint ©️ — Check MATLAB code files for possible problems.
  • DrNim — DrNim combines the Nim frontend with the Z3 proof engine in order to allow verify / validate software written in Nim.

  • nimfmt — Nim code formatter / linter / style checker

  • Sys — A static/symbolic Tool for finding bugs in (browser) code. It uses the LLVM AST to find bugs like uninitialized memory access.

  • VeriFast — A tool for modular formal verification of correctness properties of single-threaded and multithreaded C and Java programs annotated with preconditions and postconditions written in separation logic. To express rich specifications, the programmer can define inductive datatypes, primitive recursive pure functions over these datatypes, and abstract separation logic predicates.

  • CakeFuzzer — Web application security testing tool for CakePHP-based web applications. CakeFuzzer employs a predefined set of attacks that are randomly modified before execution. Leveraging its deep understanding of the Cake PHP framework, Cake Fuzzer launches attacks on all potential application entry points.

  • churn-php — Helps discover good candidates for refactoring.

  • composer-dependency-analyser — Fast detection of composer dependency issues.

  • 💪 Powerful: Detects unused, shadow and misplaced composer dependencies
  • ⚡ Performant: Scans 15 000 files in 2s!
  • ⚙️ Configurable: Fine-grained ignores via PHP config
  • 🕸️ Lightweight: No composer dependencies
  • 🍰 Easy-to-use: No config needed for first try
  • ✨ Compatible: PHP >= 7.2
  • dephpend — Dependency analysis tool.

  • deprecation-detector — Finds usages of deprecated (Symfony) code.

  • deptrac — Enforce rules for dependencies between software layers.

  • DesignPatternDetector — Detection of design patterns in PHP code.

  • EasyCodingStandard — Combine PHP_CodeSniffer and PHP-CS-Fixer.

  • Enlightn — A static and dynamic analysis tool for Laravel applications that provides recommendations to improve the performance, security and code reliability of Laravel apps. Contains 120 automated checks.

  • exakat — An automated code reviewing engine for PHP.

  • GrumPHP — Checks code on every commit.

  • larastan — Adds static analysis to Laravel improving developer productivity and code quality. It is a wrapper around PHPStan.

  • Mondrian ⚠️ — A set of static analysis and refactoring tools which use graph theory.

  • Nitpick CI ©️ — Automated PHP code review.

  • parallel-lint — This tool checks syntax of PHP files faster than serial check with a fancier output.

  • Parse — A Static Security Scanner.

  • pdepend — Calculates software metrics like cyclomatic complexity for PHP code.

  • phan — A modern static analyzer from etsy.

  • PHP Architecture Tester — Easy to use architecture testing tool for PHP.

  • PHP Assumptions — Checks for weak assumptions.

  • PHP Coding Standards Fixer — Fixes your code according to standards like PSR-1, PSR-2, and the Symfony standard.

  • PHP Insights — Instant PHP quality checks from your console. Analysis of code quality and coding style as well as overview of code architecture and its complexity.

  • Php Inspections (EA Extended) — A Static Code Analyzer for PHP.

  • PHP Refactoring Browser — Refactoring helper.

  • PHP Semantic Versioning Checker ⚠️ — Suggests a next version according to semantic versioning.

  • PHP-Parser — A PHP parser written in PHP.

  • php-speller — PHP spell check library.

  • PHP-Token-Reflection ⚠️ — Library emulating the PHP internal reflection.

  • php7cc ⚠️ — PHP 7 Compatibility Checker.

  • php7mar ⚠️ — Assist developers in porting their code quickly to PHP 7.

  • PHP_CodeSniffer — Detects violations of a defined set of coding standards.

  • PHPArkitect — PHPArkitect helps you to keep your PHP codebase coherent and solid, by permitting to add some architectural constraint check to your workflow. You can express the constraint that you want to enforce, in simple and readable PHP code.

  • phpca ⚠️ — Finds usage of non-built-in extensions.

  • phpcpd ⚠️ — Copy/Paste Detector for PHP code.

  • phpdcd ⚠️ — Dead Code Detector (DCD) for PHP code.

  • PhpDependencyAnalysis ⚠️ — Builds a dependency graph for a project.

  • PhpDeprecationDetector — Analyzer of PHP code to search issues with deprecated functionality in newer interpreter versions. It finds removed objects (functions, variables, constants and ini-directives), deprecated functions functionality, and usage of forbidden names or tricks (e.g. reserved identifiers in newer versions).

  • phpdoc-to-typehint ⚠️ — Add scalar type hints and return types to existing PHP projects using PHPDoc annotations.

  • phpDocumentor — Analyzes PHP source code to generate documentation.

  • phploc — A tool for quickly measuring the size and analyzing the structure of a PHP project.

  • PHPMD — Finds possible bugs in your code.

  • PhpMetrics — Calculates and visualizes various code quality metrics.

  • phpmnd — Helps to detect magic numbers.

  • PHPQA ⚠️ — A tool for running QA tools (phploc, phpcpd, phpcs, pdepend, phpmd, phpmetrics).

  • phpqa - jakzal — Many tools for PHP static analysis in one container.

  • phpqa - jmolivas — PHPQA all-in-one Analyzer CLI tool.

  • phpsa ⚠️ — Static analysis tool for PHP.

  • PHPStan — PHP Static Analysis Tool - discover bugs in your code without running it!

  • Progpilot — A static analysis tool for security purposes.

  • Psalm — Static analysis tool for finding type errors in PHP applications.

  • Qafoo Quality Analyzer ⚠️ — Visualizes metrics and source code.

  • rector — Instant Upgrades and Automated Refactoring of any PHP 5.3+ code. It upgrades your code for PHP 7.4, 8.0 and beyond. Rector promises a low false-positive rate because it looks for narrowly defined AST (abstract syntax tree) patterns. The main use-case are tackling technical debt in your legacy code and removing dead code. Rector provides a set of special rules for Symfony, Doctrine, PHPUnit, and many more.

  • Reflection — Reflection library to do Static Analysis for PHP Projects

  • Symfony Insight ©️ — Detect security risks, find bugs and provide actionable metrics for PHP projects.

  • Tuli — A static analysis engine.

  • twig-lint — twig-lint is a lint tool for your twig files.

  • WAP — Tool to detect and correct input validation vulnerabilities in PHP (4.0 or higher) web applications and predicts false positives by combining static analysis and data mining.

  • ZPA — An open source parser and code analyzer for PL/SQL and Oracle SQL code.
  • Perl::Analyzer — Perl-Analyzer is a set of programs and modules that allow users to analyze and visualize Perl codebases by providing information about namespaces and their relations, dependencies, inheritance, and methods implemented, inherited, and redefined in packages, as well as calls to methods from parent packages via SUPER.

  • Perl::Critic — Critique Perl source code for best-practices.

  • perltidy — Perltidy is a Perl script which indents and reformats Perl scripts to make them easier to read. The formatting can be controlled with command line parameters. The default parameter settings approximately follow the suggestions in the Perl Style Guide. Besides reformatting scripts, Perltidy can be a great help in tracking down errors with missing or extra braces, parentheses, and square brackets because it is very good at localizing errors.

  • zarn — A lightweight static security analysis tool for modern Perl Apps

  • autoflake — Autoflake removes unused imports and unused variables from Python code.

  • autopep8 — A tool that automatically formats Python code to conform to the PEP 8 style guide. It uses the pycodestyle utility to determine what parts of the code needs to be formatted.

  • bandit — A tool to find common security issues in Python code.

  • bellybutton — A linting engine supporting custom project-specific rules.

  • Black — The uncompromising Python code formatter.

  • Bowler — Safe code refactoring for modern Python. Bowler is a refactoring tool for manipulating Python at the syntax tree level. It enables safe, large scale code modifications while guaranteeing that the resulting code compiles and runs. It provides both a simple command line interface and a fluent API in Python for generating complex code modifications in code.

  • ciocheck ⚠️ — Linter, formatter and test suite helper. As a linter, it is a wrapper around pep8, pydocstyle, flake8, and pylint.

  • cohesion ⚠️ — A tool for measuring Python class cohesion.

  • deal — Design by contract for Python. Write bug-free code. By adding a few decorators to your code, you get for free tests, static analysis, formal verification, and much more.

  • Dlint — A tool for ensuring Python code is secure.

  • Dodgy — Dodgy is a very basic tool to run against your codebase to search for "dodgy" looking values. It is a series of simple regular expressions designed to detect things such as accidental SCM diff checkins, or passwords or secret keys hard coded into files.

  • ENRE-py ⚠️ — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-py is a ENtity Relationship Extractor for Python based on Python Language Services of The Standard Library.

  • fixit — A framework for creating lint rules and corresponding auto-fixes for source code.

  • flake8 — A wrapper around pyflakes, pycodestyle and mccabe.

  • flakeheaven — flakeheaven is a python linter built around flake8 to enable inheritable and complex toml configuration.

  • InspectorTiger ⚠️ — IT, Inspector Tiger, is a modern python code review tool / framework. It comes with bunch of pre-defined handlers which warns you about improvements and possible bugs. Beside these handlers, you can write your own or use community ones.

  • jedi — Autocompletion/static analysis library for Python.

  • linty fresh — Parse lint errors and report them to Github as comments on a pull request.

  • mccabe — Check McCabe complexity.

  • multilint ⚠️ — A wrapper around flake8, isort and modernize.

  • mypy — A static type checker that aims to combine the benefits of duck typing and static typing, frequently used with MonkeyType.

  • prospector — A wrapper around pylint, pep8, mccabe and others.

  • py-find-injection ⚠️ — Find SQL injection vulnerabilities in Python code.

  • pyanalyze — A tool for programmatically detecting common mistakes in Python code, such as references to undefined variables and type errors. It can be extended to add additional rules and perform checks specific to particular functions.

  • PyCodeQual ©️ — PyCodeQual gives you insights into complexity and bug risks. It adds automatic reviews to your pull requests.

  • pycodestyle — (Formerly pep8) Check Python code against some of the style conventions in PEP 8.

  • pydocstyle — Check compliance with Python docstring conventions.

  • pyflakes — Check Python source files for errors.

  • pylint — Looks for programming errors, helps enforcing a coding standard and sniffs for some code smells. It additionally includes pyreverse (an UML diagram generator) and symilar (a similarities checker).

  • pylyzers — A static code analyzer / language server for Python, written in Rust, focused on type checking and readable output.

  • pyre-check — A fast, scalable type checker for large Python codebases.

  • pyright — Static type checker for Python, created to address gaps in existing tools like mypy.

  • pyroma — Rate how well a Python project complies with the best practices of the Python packaging ecosystem, and list issues that could be improved.

  • Pysa — A tool based on Facebook's pyre-check to identify potential security issues in Python code identified with taint analysis.

  • PyT - Python Taint ⚠️ — A static analysis tool for detecting security vulnerabilities in Python web applications.

  • pytype — A static type analyzer for Python code.

  • pyupgrade — A tool (and pre-commit hook) to automatically upgrade syntax for newer versions of the language.

  • QuantifiedCode ⚠️ — Automated code review & repair. It helps you to keep track of issues and metrics in your software projects, and can be easily extended to support new types of analyses.

  • radon ⚠️ — A Python tool that computes various metrics from the source code.

  • refurb — A tool for refurbishing and modernizing Python codebases. Refurb is heavily inspired by clippy, the built-in linter for Rust.

  • ruff — Fast Python linter, written in Rust. 10-100x faster than existing linters. Compatible with Python 3.10. Supports file watcher.

  • unimport — A linter, formatter for finding and removing unused import statements.

  • vulture — Find unused classes, functions and variables in Python code.

  • wemake-python-styleguide — The strictest and most opinionated python linter ever.

  • wily — A command-line tool for archiving, exploring and graphing the complexity of Python source code.

  • xenon ⚠️ — Monitor code complexity using radon.

  • yapf — A formatter for Python files created by Google YAPF follows a distinctive methodology, originating from the 'clang-format' tool created by Daniel Jasper. Essentially, the program reframes the code to the most suitable formatting that abides by the style guide, even if the original code already follows the style guide. This concept is similar to the Go programming language's 'gofmt' tool, which aims to put an end to debates about formatting by having the entire codebase of a project pass through YAPF whenever changes are made, thereby maintaining a consistent style throughout the project and eliminating the need to argue about style in every code review.

  • cyclocomp — Quantifies the cyclomatic complexity of R functions / expressions.

  • goodpractice — Analyses the source code for R packages and provides best-practice recommendations.

  • lintr — Static Code Analysis for R.

  • styler — Formatting of R source code files and pretty-printing of R code.

  • Regal — Regal is a linter for the policy language Rego. Regal aims to catch bugs and mistakes in policy code, while at the same time helping people learn the language, best practices and idiomatic constructs.
  • brakeman — A static analysis security vulnerability scanner for Ruby on Rails applications.

  • bundler-audit — Audit Gemfile.lock for gems with security vulnerabilities reported in Ruby Advisory Database.

  • cane ⚠️ — Code quality threshold checking as part of your build.

  • Churn — A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.

  • dawnscanner — A static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.

  • ERB Lint — Lint your ERB or HTML files

  • Fasterer — Common Ruby idioms checker.

  • flay — Flay analyzes code for structural similarities.

  • flog ⚠️ — Flog reports the most tortured code in an easy to read pain report. The higher the score, the more pain the code is in.

  • Fukuzatsu — A tool for measuring code complexity in Ruby class files. Its analysis generates scores based on cyclomatic complexity algorithms with no added "opinions".

  • htmlbeautifier — A normaliser/beautifier for HTML that also understands embedded Ruby. Ideal for tidying up Rails templates.

  • laser ⚠️ — Static analysis and style linter for Ruby code.

  • MetricFu ⚠️ — MetricFu is a set of tools to provide reports that show which parts of your code might need extra work.

  • pelusa — Static analysis Lint-type tool to improve your OO Ruby code.

  • quality ⚠️ — Runs quality checks on your code using community tools, and makes sure your numbers don't get any worse over time.

  • Querly ⚠️ — Pattern Based Checking Tool for Ruby.

  • Railroader ⚠️ — An open source static analysis security vulnerability scanner for Ruby on Rails applications.

  • rails_best_practices ⚠️ — A code metric tool for Rails projects

  • reek — Code smell detector for Ruby.

  • Roodi ⚠️ — Roodi stands for Ruby Object Oriented Design Inferometer. It parses your Ruby code and warns you about design issues you have based on the checks that it has configured.

  • RuboCop — A Ruby static code analyzer, based on the community Ruby style guide.

  • Rubrowser — Ruby classes interactive dependency graph generator.

  • ruby-lint ⚠️ — Static code analysis for Ruby.

  • rubycritic — A Ruby code quality reporter.

  • rufo — An opinionated ruby formatter, intended to be used via the command line as a text-editor plugin, to autoformat files on save or on demand.

  • Saikuro ⚠️ — A Ruby cyclomatic complexity analyzer.

  • SandiMeter ⚠️ — Static analysis tool for checking Ruby code for Sandi Metz' rules.

  • Sorbet — A fast, powerful type checker designed for Ruby.

  • Standard Ruby — Ruby Style Guide, with linter & automatic code fixer

  • Steep — Gradual Typing for Ruby.

  • C2Rust — C2Rust helps you migrate C99-compliant code to Rust. The translator (or transpiler) produces unsafe Rust code that closely mirrors the input C code.

  • cargo udeps — Find unused dependencies in Cargo.toml. It either prints out a "unused crates" line listing the crates, or it prints out a line saying that no crates were unused.

  • cargo-audit — Audit Cargo.lock for crates with security vulnerabilities reported to the RustSec Advisory Database.

  • cargo-bloat — Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.

  • cargo-breaking — cargo-breaking compares a crate's public API between two different branches, shows what changed, and suggests the next version according to semver.

  • cargo-call-stack — Whole program static stack analysis The tool produces the full call graph of a program as a dot file.

  • cargo-deny — A cargo plugin for linting your dependencies. It can be used either as a command line too, a Rust crate, or a Github action for CI. It checks for valid license information, duplicate crates, security vulnerabilities, and more.

  • cargo-expand — Cargo subcommand to show result of macro expansion and #[derive] expansion applied to the current crate. This is a wrapper around a more verbose compiler command.

  • cargo-geiger — A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing

  • cargo-inspect ⚠️ — Inspect Rust code without syntactic sugar to see what the compiler does behind the curtains.

  • cargo-semver-checks — Scan your Rust crate releases for semver violations. It can be used either directly via the CLI, as a GitHub Action in CI, or via release managers like release-plz. It found semver violations in more than 1 in 6 of the top 1000 most-downloaded crates on crates.io.

  • cargo-show-asm — cargo subcommand showing the assembly, LLVM-IR and MIR generated for Rust code

  • cargo-spellcheck — Checks all your documentation for spelling and grammar mistakes with hunspell (ready) and languagetool (preview)

  • cargo-unused-features ⚠️ — Find potential unused enabled feature flags and prune them. You can generate a simple HTML report from the json to make it easier to inspect results. It removes a feature of a dependency and then compiles the project to see if it still compiles. If it does, the feature flag can possibly be removed, but it can be a false-positive.

  • clippy — A code linter to catch common mistakes and improve your Rust code.

  • diff.rs — Web application (WASM) to render a diff between Rust crate versions.

  • dylint — A tool for running Rust lints from dynamic libraries. Dylint makes it easy for developers to maintain their own personal lint collections.

  • electrolysis ⚠️ — A tool for formally verifying Rust programs by transpiling them into definitions in the Lean theorem prover.

  • herbie ⚠️ — Adds warnings or errors to your crate when using a numerically unstable floating point expression.

  • kani — The Kani Rust Verifier is a bit-precise model checker for Rust. Kani is particularly useful for verifying unsafe code blocks in Rust, where the "unsafe superpowers" are unchecked by the compiler. Kani verifies:

  • Memory safety (e.g., null pointer dereferences)
  • User-specified assertions (i.e., assert!(...))
  • The absence of panics (e.g., unwrap() on None values)
  • The absence of some types of unexpected behavior (e.g., arithmetic overflows)
  • linter-rust ⚠️ — Linting your Rust-files in Atom, using rustc and cargo.

  • lockbud — Statically detects Rust deadlocks bugs. It currently detects two common kinds of deadlock bugs: doublelock and locks in conflicting order. It will print bugs in JSON format together with the source code location and an explanation of each bug.

  • MIRAI — And abstract interpreter operating on Rust's mid-level intermediate language, and providing warnings based on taint analysis.

  • prae ⚠️ — Provides a convenient macro that allows you to generate type wrappers that promise to always uphold arbitrary invariants that you specified.

  • Prusti — A static verifier for Rust, based on the Viper verification infrastructure. By default Prusti verifies absence of panics by proving that statements such as unreachable!() and panic!() are unreachable.

  • Rudra — Rust Memory Safety & Undefined Behavior Detection. It is capable of analyzing single Rust packages as well as all the packages on crates.io.

  • Rust Language Server ⚠️ — Supports functionality such as 'goto definition', symbol search, reformatting, and code completion, and enables renaming and refactorings.

  • rust-analyzer — Supports functionality such as 'goto definition', type inference, symbol search, reformatting, and code completion, and enables renaming and refactorings.

  • rust-audit — Audit Rust binaries for known bugs or security vulnerabilities. This works by embedding data about the dependency tree (Cargo.lock) in JSON format into a dedicated linker section of the compiled executable.

  • rustfix — Read and apply the suggestions made by rustc (and third-party lints, like those offered by clippy).

  • rustfmt — A tool for formatting Rust code according to style guidelines.

  • RustViz — RustViz is a tool that generates visualizations from simple Rust programs to assist users in better understanding the Rust Lifetime and Borrowing mechanism. It generates SVG files with graphical indicators that integrate with mdbook to render visualizations of data-flow in Rust programs.

  • warnalyzer — Show unused code from multi-crate Rust projects

  • dbcritic — dbcritic finds problems in a database schema, such as a missing primary key constraint in a table.

  • holistic — More than 1,300 rules to analyze SQL queries. Takes an SQL schema definition and the query source code to generate improvement recommendations. Detects code smells, unused indexes, unused tables, views, materialized views, and more.

  • pgspot — Spot vulnerabilities in postgres extension scripts. Finds unsafe search_path usage and unsafe object creation in PostgreSQL extension scripts or any other PostgreSQL SQL code.

  • sleek — Sleek is a CLI tool for formatting SQL. It helps you maintain a consistent style across your SQL code, enhancing readability and productivity. The heavy lifting is done by the sqlformat crate.

  • sqlcheck — Automatically identify anti-patterns in SQL queries.

  • SQLFluff — Multiple dialect SQL linter and formatter.

  • sqlint — Simple SQL linter.

  • squawk — Linter for PostgreSQL, focused on migrations. Prevents unexpected downtime caused by database migrations and encourages best practices around Postgres schemas and SQL.

  • tsqllint — T-SQL-specific linter.

  • TSqlRules ⚠️ — TSQL Static Code Analysis Rules for SQL Server.

  • Visual Expert ©️ — Code analysis for PowerBuilder, Oracle, and SQL Server Explores, analyzes, and documents Code

  • linter ⚠️ — Linter is a Scala static analysis compiler plugin which adds compile-time checks for various possible bugs, inefficiencies, and style problems.

  • Scalastyle — Scalastyle examines your Scala code and indicates potential problems with it.

  • scapegoat — Scala compiler plugin for static code analysis.

  • WartRemover — A flexible Scala code linting tool.

  • bashate — Code style enforcement for bash programs. The output format aims to follow pycodestyle (pep8) default output format.

  • i-Code CNES for Shell — An open source static code analysis tool for Shell and Fortran (77 and 90).

  • kmdr — CLI tool for learning commands from your terminal. kmdr delivers a break down of commands with every attribute explained.

  • sh — A shell parser, formatter, and interpreter with bash support; includes shfmt

  • shellcheck — ShellCheck, a static analysis tool that gives warnings and suggestions for bash/sh shell scripts.

  • shellharden — A syntax highlighter and a tool to semi-automate the rewriting of scripts to ShellCheck conformance, mainly focused on quoting.

  • SwiftFormat — A library and command-line formatting tool for reformatting Swift code.

  • SwiftLint — A tool to enforce Swift style and conventions.

  • Tailor ⚠️ — A static analysis and lint tool for source code written in Apple's Swift programming language.

  • Frink — A Tcl formatting and static check program (can prettify the program, minimise, obfuscate or just sanity check it).

  • Nagelfar — A static syntax checker for Tcl.

  • tclchecker — A static syntax analysis module (as part of TDK).

  • Angular ESLint — Linter for Angular projects

  • Codelyzer ⚠️ — A set of tslint rules for static code analysis of Angular 2 TypeScript projects.

  • ENRE-ts — ENRE (ENtity Relationship Extractor) is a tool for extraction of code entity dependencies or relationships from source code. ENRE-ts is a ENtity Relationship Extractor for ECMAScript and TypeScript based on @babel/parser.

  • fta — Rust-based static analysis for TypeScript projects

  • stc — Speedy TypeScript type checker written in Rust

  • tslint ⚠️ — TSLint has been deprecated as of 2019. Please see this issue for more details. typescript-eslint is now your best option for linting TypeScript. TSLint is an extensible static analysis tool that checks TypeScript code for readability, maintainability, and functionality errors. It is widely supported across modern editors & build systems and can be customized with your own lint rules, configurations, and formatters.

  • tslint-clean-code — A set of TSLint rules inspired by the Clean Code handbook.

  • tslint-microsoft-contrib ⚠️ — A set of tslint rules for static code analysis of TypeScript projects maintained by Microsoft.

  • TypeScript Call Graph ⚠️ — CLI to generate an interactive graph of functions and calls from your TypeScript files

  • TypeScript ESLint — TypeScript language extension for eslint.

  • zod — TypeScript-first schema validation with static type inference. The goal is to eliminate duplicative type declarations. With Zod, you declare a validator once and Zod will automatically infer the static TypeScript type. It is easy to compose simpler types into complex data structures.

  • Icarus Verilog — A Verilog simulation and synthesis tool that operates by compiling source code written in IEEE-1364 Verilog into some target format

  • svls — A Language Server Protocol implementation for Verilog and SystemVerilog, including lint capabilities.

  • verible-linter-action — Automatic SystemVerilog linting in github actions with the help of Verible Used to lint Verilog and SystemVerilog source files and comment erroneous lines of code in Pull Requests automatically.

  • Verilator — A tool which converts Verilog to a cycle-accurate behavioral model in C++ or SystemC. Performs lint code-quality checks.

  • vscode-verilog-hdl-support — Verilog HDL/SystemVerilog/Bluespec SystemVerilog support for VS Code. Provides syntax highlighting and Linting support from Icarus Verilog, Vivado Logical Simulation, Modelsim and Verilator

  • vint — Fast and Highly Extensible Vim script Language Lint implemented by Python.

Multiple languages

  • ale — Asynchronous Lint Engine for Vim and NeoVim with support for many languages.

  • Android Studio — Based on IntelliJ IDEA, and comes bundled with tools for Android including Android Lint.

  • AppChecker ©️ — Static analysis for C/C++/C#, PHP and Java.

  • Application Inspector ©️ — Commercial Static Code Analysis which generates exploits to verify vulnerabilities.

  • ApplicationInspector — Creates reports of over 400 rule patterns for feature detection (e.g. the use of cryptography or version control in apps).

  • ArchUnit — Unit test your Java or Kotlin architecture.

  • Atom-Beautify ⚠️ — Beautify HTML, CSS, JavaScript, PHP, Python, Ruby, Java, C, C++, C#, Objective-C, CoffeeScript, TypeScript, Coldfusion, SQL, and more in Atom editor.

  • autocorrect — A linter and formatter to help you to improve copywriting, correct spaces, words, punctuations between CJK (Chinese, Japanese, Korean).

  • Axivion Bauhaus Suite ©️ — Tracks down error-prone code locations, style violations, cloned or dead code, cyclic dependencies and more for C/C++, C#/.NET, Java and Ada 83/Ada 95.

  • Bearer — Open-Source static code analysis tool to discover, filter and prioritize security risks and vulnerabilities leading to sensitive data exposures (PII, PHI, PD). Highly configurable and easily extensible, built for security and engineering teams.

  • Better Code Hub ©️ — Better Code Hub checks your GitHub codebase against 10 engineering guidelines devised by the authority in software quality, Software Improvement Group.

  • Betterscan CE — Checks your code and infra (various Git repositories supported, cloud stacks, CLI, Web Interface platform, integrationss available) for security and quality issues. Code Scanning/SAST/Linting using many tools/Scanners deduplicated with One Report (AI optional).

  • biome — A toolchain for web projects, aimed to provide functionalities to maintain them. Biome formats and lints code in a fraction of a second. It is the successor to Rome. It is designed to eventually replace Biome is designed to eventually replace Babel, ESLint, webpack, Prettier, Jest, and others.

  • BugProve ©️ — BugProve is a firmware analysis platform featuring both static and dynamic analysis techniques to discover memory corruptions, command injections and other classes or common weaknesses in binary code. It also detects vulnerable dependencies, weak cryptographic parameters, misconfigurations, and more.

  • callGraph — Statically generates a call graph image and displays it on screen.

  • CAST Highlight ©️ — Commercial Static Code Analysis which runs locally, but uploads the results to its cloud for presentation.

  • Checkmarx CxSAST ©️ — Commercial Static Code Analysis which doesn't require pre-compilation.

  • ClassGraph — A classpath and module path scanner for querying or visualizing class metadata or class relatedness.

  • Clayton ©️ — AI-powered code reviews for Salesforce. Secure your developments, enforce best practice and control your technical debt in real-time.

  • coala ⚠️ — Language independent framework for creating code analysis - supports over 60 languages by default.

  • Cobra ©️ — Structural source code analyzer by NASA's Jet Propulsion Laboratory.

  • Codacy ©️ — Code Analysis to ship Better Code, Faster.

  • Code Intelligence ©️ — CI/CD-agnostic DevSecOps platform which combines industry-leading fuzzing engines for finding bugs and visualizing code coverage

  • Codeac ©️ — Automated code review tool integrates with GitHub, Bitbucket and GitLab (even self-hosted). Available for JavaScript, TypeScript, Python, Ruby, Go, PHP, Java, Docker, and more. (open-source free)

  • codeburner — Provides a unified interface to sort and act on the issues it finds.

  • codechecker — A defect database and viewer extension for the Clang Static Analyzer with web GUI.

  • CodeFactor ©️ — Automated Code Analysis for repos on GitHub or BitBucket.

  • CodeFlow ©️ — Automated code analysis tool to deal with technical depth. Integrates with Bitbucket and Gitlab. (free for Open Source Projects)

  • CodeIt.Right ©️ — CodeIt.Right™ provides a fast, automated way to ensure that your source code adheres to (your) predefined design and style guidelines as well as best coding practices.

  • Codemodder — Codemodder is a pluggable framework for building expressive codemods. Use Codemodder when you need more than a linter or code formatting tool. Use it to fix non-trivial security issues and other code quality problems.

  • CodePatrol ©️ — Automated SAST code reviews driven by security, supports 15+ languages and includes security training.

  • codeql — Deep code analysis - semantic queries and dataflow for several languages with VSCode plugin support.

  • CodeQue — Ecosystem for structural matching JavaScript and TypeScript code. Offers search tool that understands code structure. Available as CLI tool and Visual Studio Code extension. It helps to search code faster and more accurately making you workflow more effective. Soon it will offer ESLint plugin to create your own rules in minutes to help with assuring codebase quality.

  • CodeRush ©️ — Code creation, debugging, navigation, refactoring, analysis and visualization tools that use the Roslyn engine in Visual Studio 2015 and up.

  • CodeScan ©️ — Code Quality and Security for Salesforce Developers. Made exclusively for the Salesforce platform, CodeScan’s code analysis solutions provide you with total visibility into your code health.

  • CodeScene ©️ — CodeScene is a quality visualization tool for software. Prioritize technical debt, detect delivery risks, and measure organizational aspects. Fully automated.

  • CodeSee ©️ — CodeSee is mapping and automating your app's services, directories, file dependencies, and code changes. It's like Google Map, but for code.t

  • CodeSonar from GrammaTech ©️ — Advanced, whole program, deep path, static analysis of C, C++, Java and C# with easy-to-understand explanations and code and path visualization.

  • Codety ©️ — Codety Scanner is a comprehensive source code scanner that embeds 5000+ static code analysis rules, which aim to detect code issues for 20+ programming languages and IaC tools.

  • Codiga ©️ — Automated Code Reviews and Technical Debt management platform that supports 12+ languages.

  • Corrode ⚠️ — Semi-automatic translation from C to Rust. Could reveal bugs in the original implementation by showing Rust compiler warnings and errors. Superseded by C2Rust.

  • Coverity ©️ — Synopsys Coverity supports 20 languages and over 70 frameworks including Ruby on rails, Scala, PHP, Python, JavaScript, TypeScript, Java, Fortran, C, C++, C#, VB.NET.

  • cpp-linter-action — A Github Action for linting C/C++ code integrating clang-tidy and clang-format to collect feedback provided in the form of thread comments and/or annotations.

  • cqc ⚠️ — Check your code quality for js, jsx, vue, css, less, scss, sass and styl files.

  • DeepCode ⚠️ ©️ — DeepCode was acquired by Snyk is now Snyk Code.

  • DeepSource ©️ — In-depth static analysis to find issues in verticals of bug risks, security, anti-patterns, performance, documentation and style. Native integrations with GitHub, GitLab and Bitbucket. Less than 5% false positives.

  • Depends — Analyses the comprehensive dependencies of code elements for Java, C/C++, Ruby.

  • DevSkim — Regex-based static analysis tool for Visual Studio, VS Code, and Sublime Text - C/C++, C#, PHP, ASP, Python, Ruby, Java, and others.

  • dotenet-format — A code formatter for .NET. Preferences will be read from an .editorconfig file, if present, otherwise a default set of preferences will be used. At this time dotnet-format is able to format C# and Visual Basic projects with a subset of supported .editorconfig options.

  • Embold ©️ — Intelligent software analytics platform that identifies design issues, code issues, duplication and metrics. Supports Java, C, C++, C#, JavaScript, TypeScript, Python, Go, Kotlin and more.

  • emerge — Emerge is a source code and dependency visualizer that can be used to gather insights about source code structure, metrics, dependencies and complexity of software projects. After scanning the source code of a project it provides you an interactive web interface to explore and analyze your project by using graph structures.

  • ESLint — An extensible linter for JS, following the ECMAScript standard.

  • ezno — A JavaScript compiler and TypeScript checker written in Rust with a focus on static analysis and runtime performance. Ezno's type checker is built from scratch. The checker is fully compatible with TypeScript type annotations and can work without any type annotations at all.

  • Find Security Bugs — The SpotBugs plugin for security audits of Java web applications and Android applications. (Also work with Kotlin, Groovy and Scala projects)

  • Fortify ©️ — A commercial static analysis platform that supports the scanning of C/C++, C#, VB.NET, VB6, ABAP/BSP, ActionScript, Apex, ASP.NET, Classic ASP, VB Script, Cobol, ColdFusion, HTML, Java, JS, JSP, MXML/Flex, Objective-C, PHP, PL/SQL, T-SQL, Python (2.6, 2.7), Ruby (1.9.3), Swift, Scala, VB, and XML.

  • Freeplane Code Explorer — The Code Explorer mode in Freeplane is designed for analyzing the structure and dependencies of code compiled to JVM class files. It also allows displaying ArchUnit test results directly in Freeplane, if Freeplane is running and ArchUnit detects rule violations during the tests.

  • Goodcheck — Regexp based customizable linter.

  • goone ⚠️ — Finds N+1 queries (SQL calls in a for loop) in go code

  • graudit — Grep rough audit - source code auditing tool.

  • HCL AppScan Source ©️ — Commercial Static Code Analysis.

  • Hopper ⚠️ — A static analysis tool written in scala for languages that run on JVM.

  • Hound CI ⚠️ — Comments on style violations in GitHub pull requests. Supports Coffeescript, Go, HAML, JavaScript, Ruby, SCSS and Swift.

  • imhotep ⚠️ — Comment on commits coming into your repository and check for syntactic errors and general lint warnings.

  • include-gardener ⚠️ — A multi-language static analyzer for C/C++/Obj-C/Python/Ruby to create a graph (in dot or graphml format) which shows all #include relations of a given set of files.

  • Infer — A static analyzer for Java, C and Objective-C

  • Kiuwan ©️ — Identify and remediate cyber threats in a blazingly fast, collaborative environment, with seamless integration in your SDLC. Python, C\C++, Java, C#, PHP and more.

  • Klocwork ©️ — Quality and Security Static analysis for C/C++, Java and C#.

  • LGTM ©️ — Find security vulnerabilities, variants, and critical code quality issues using CodeQL queries over source code. Automatic PR code review; free for open source. Formerly semmle. It supports public Git repositories hosted on Bitbucket Cloud, GitHub.com, GitLab.com.

  • lizard — Lizard is an extensible Cyclomatic Complexity Analyzer for many programming languages including C/C++ (doesn't require all the header files or Java imports). It also does copy-paste detection (code clone detection/code duplicate detection) and many other forms of static code analysis. Counts lines of code without comments, CCN (cyclomatic complexity number), token count of functions, parameter count of functions.

  • Mega-Linter — Mega-Linter can handle any type of project thanks to its 70+ embedded Linters, its advanced reporting, runnable on any CI system or locally, with assisted installation and configuration, able to apply formatting and fixes

  • Mobb ©️ — Mobb is a trusted, automatic vulnerability fixer that secures applications, reduces security backlogs, and frees developers to focus on innovation. Mobb is free for open-source projects.

  • MOPSA — A static analyzer designed to easily reuse abstract domains across widely different languages (such as C and Python).

  • oclint ⚠️ — A static source code analysis tool to improve quality and reduce defects for C, C++ and Objective-C.

  • Offensive 360 ©️ — Commercial Static Code Analysis system doesn't require building the source code or pre-compilation.

  • OpenRewrite — OpenRewrite fixes common static analysis issues reported through Sonar and other tools using a Maven and Gradle plugin or the Moderne CLI.

  • OpenStaticAnalyzer — OpenStaticAnalyzer is a source code analyzer tool, which can perform deep static analysis of the source code of complex systems.

  • oxc — The Oxidation Compiler is creating a suite of high-performance tools for the JavaScript / TypeScript language re-written in Rust.

  • parasoft ©️ — Automated Software Testing Solutions for unit-, API-, and web UI testing. Complies with MISRA, OWASP, and others.

  • pfff ⚠️ — Facebook's tools for code analysis, visualizations, or style-preserving source transformation for many languages.

  • Pixee ©️ — Pixeebot finds security and code quality issues in your code and creates merge-ready pull requests with recommended fixes.

  • PMD — A source code analyzer for Java, Salesforce Apex, Javascript, PLSQL, XML, XSL and others.

  • pre-commit — A framework for managing and maintaining multi-language pre-commit hooks.

  • Precaution — Precaution is a static analysis security tool (SAST) designed to find potentially critical vulnerabilities in source code prior to production. It is available as a CLI, GitHub Action, and GitHub App.

  • Prettier — An opinionated code formatter.

  • Pronto — Quick automated code review of your changes. Supports more than 40 runners for various languages, including Clang, Elixir, JavaScript, PHP, Ruby and more.

  • PT.PM ⚠️ — An engine for searching patterns in the source code, based on Unified AST or UST. At present time C#, Java, PHP, PL/SQL, T-SQL, and JavaScript are supported. Patterns can be described within the code or using a DSL.

  • Putout — Pluggable and configurable code transformer with built-in eslint, babel plugins support for js, jsx typescript, flow, markdown, yaml and json.

  • PVS-Studio ©️ — A (conditionally free for FOSS and individual developers) static analysis of C, C++, C# and Java code. For advertising purposes you can propose a large FOSS project for analysis by PVS employees. Supports CWE mapping, OWASP ASVS, MISRA, AUTOSAR and SEI CERT coding standards.

  • pylama — Code audit tool for Python and JavaScript. Wraps pycodestyle, pydocstyle, PyFlakes, Mccabe, Pylint, and more

  • Qwiet AI ©️ — Identify vulnerabilities that are unique to your code base before they reach production. Leverages the Code Property Graph (CPG) to run its analyses concurrently in a single graph of graphs. Automatically finds business logic flaws in dev like hardcoded secrets and logic bombs

  • Refactoring Essentials — The free Visual Studio 2015 extension for C# and VB.NET refactorings, including code best practice analyzers.

  • relint — A static file linter that allows you to write custom rules using regular expressions (RegEx).

  • ReSharper ©️ — Extends Visual Studio with on-the-fly code inspections for C#, VB.NET, ASP.NET, JavaScript, TypeScript and other technologies.

  • RIPS ©️ — A static source code analyser for vulnerabilities in PHP scripts.

  • Roslyn Analyzers — Roslyn-based implementation of FxCop analyzers.

  • Roslyn Security Guard — Project that focuses on the identification of potential vulnerabilities such as SQL injection, cross-site scripting (XSS), CSRF, cryptography weaknesses, hardcoded passwords and many more.

  • SafeQL — Validate and auto-generate TypeScript types from raw SQL queries in PostgreSQL. SafeQL is an ESLint plugin for writing SQL queries in a type-safe way.

  • SAST Online ©️ — Check the Android Source code thoroughly to uncover and address potential security concerns and vulnerabilities. Static application security testing (Static Code Analysis) tool Online

  • Scrutinizer ©️ — A proprietary code quality checker that can be integrated with GitHub.

  • Security Code Scan — Security code analyzer for C# and VB.NET. Detects various security vulnerability patterns: SQLi, XSS, CSRF, XXE, Open Redirect, etc. Integrates into Visual Studio 2015 and newer. Detects various security vulnerability patterns: SQLi, XSS, CSRF, XXE, Open Redirect, etc.

  • Semgrep — A fast, open-source, static analysis tool for finding bugs and enforcing code standards at editor, commit, and CI time. Its rules look like the code you already write; no abstract syntax trees or regex wrestling. Supports 17+ languages.

  • Semgrep Supply Chain ©️ — Quickly find and remediate high-priority security issues. Semgrep Supply Chain prioritizes the 2% of vulnerabilities that are reachable from your code.

  • ShiftLeft Scan — Scan is a free open-source DevSecOps platform for detecting security issues in source code and dependencies. It supports a broad range of languages and CI/CD pipelines.

  • shipshape ⚠️ — Static program analysis platform that allows custom analyzers to plug in through a common interface.

  • Sigrid ©️ — Sigrid helps you to improve your software by measuring your system's code quality, and then compares the results against a benchmark of thousands of industry systems to give you concrete advice on areas where you can improve.

  • Similarity Tester — A tool that finds similarities between or within files to support you encountering DRY principle violations.

  • Snyk Code ©️ — Snyk Code finds security vulnerabilities based on AI. Its speed of analysis allow us to analyse your code in real time and deliver results when you hit the save button in your IDE. Supported languages are Java, JavaScript, Python, PHP, C#, Go and TypeScript. Integrations with GitHub, BitBucket and Gitlab. It is free to try and part of the Snyk platform also covering SCA, containers and IaC.

  • SonarCloud ©️ — SonarCloud enables your team to deliver clean code consistently and efficiently with a code review tool that easily integrates into the cloud DevOps platforms and extend your CI/CD workflow. SonarCloud is free for open source projects.

  • SonarLint — SonarLint is a free IDE extension available for IntelliJ, VS Code, Visual Studio, and Eclipse, to find and fix coding issues in real-time, flagging issues as you code, just like a spell-checker. More than a linter, it also delivers rich contextual guidance to help developers understand why there is an issue, assess the risk, and educate them on how to fix it.

  • SonarQube — SonarQube empowers development teams with a code quality and security solution that deeply integrates into your enterprise environment; enabling you to deploy clean code consistently and reliably. SonarQube provides a free and open source Community Edition.

  • Sonatype ©️ — Reports known vulnerabilities in common dependencies and recommends updated packages to minimize breaking changes

  • Soto Platform ©️ — Suite of static analysis tools consisting of the three components Sotoarc (Architecture Analysis), Sotograph (Quality Analysis), and Sotoreport (Quality report). Helps find differences between architecture and implementation, interface violations (e.g. external access of private parts of subsystems, detection of all classes, files, packages and subsystems which are strongly coupled by cyclical relationships and more. The Sotograph product family runs on Windows and Linux.

  • SourceMeter ©️ — Static Code Analysis for C/C++, Java, C#, Python, and RPG III and RPG IV versions (including free-form).

  • sqlvet — Performs static analysis on raw SQL queries in your Go code base to surface potential runtime errors. It checks for SQL syntax error, identifies unsafe queries that could potentially lead to SQL injections makes sure column count matches value count in INSERT statements and validates table- and column names.

  • StaticReviewer ©️ — Static Reviewer executes code checks according to the most relevant Secure Coding Standards, OWASP, CWE, CVE, CVSS, MISRA, CERT, for 40+ programming languages, using 1000+ built-in validation rules for Security, Deadcode & Best Practices Available a module for Software Composition Analysis (SCA) to find vulnerabilities in open source and third party libraries.

  • Super-Linter — Combination of multiple linters to install as a GitHub Action.

  • Svace ©️ — Static code analysis tool for Java,C,C++,C#,Go.

  • Synopsys ©️ — A commercial static analysis platform that allows for scanning of multiple languages (C/C++, Android, C#, Java, JS, PHP, Python, Node.JS, Ruby, Fortran, and Swift).

  • Teamscale ©️ — Static and dynamic analysis tool supporting more than 25 languages and direct IDE integration. Free hosting for Open Source projects available on request. Free academic licenses available.

  • TencentCodeAnalysis — Tencent Cloud Code Analysis (TCA for short, code-named CodeDog inside the company early) is a comprehensive platform for code analysis and issue tracking. TCA consist of three components, server, web and client. It integrates of a number of self-developed tools, and also supports dynamic integration of code analysis tools in various programming languages.

  • ThreatMapper — Vulnerability Scanner and Risk Evaluation for containers, serverless and hosts at runtime. ThreatMapper generates runtime BOMs from dependencies and operating system packages, matches against multiple threat feeds, scans for unprotected secrets, and scores issues based on severity and risk-of-exploit.

  • todocheck — Linter for integrating annotated TODOs with your issue trackers

  • trivy — A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CI. Trivy detects vulnerabilities of OS packages (Alpine, RHEL, CentOS, etc.) and application dependencies (Bundler, Composer, npm, yarn, etc.). Checks containers and filesystems.

  • trunk ©️ — Modern repositories include many technologies, each with its own set of linters. With 30+ linters and counting, Trunk makes it dead-simple to identify, install, configure, and run the right linters, static analyzers, and formatters for all your repos.

  • TscanCode — A fast and accurate static analysis solution for C/C++, C#, Lua codes provided by Tencent. Using GPLv3 license.

  • Undebt — Language-independent tool for massive, automatic, programmable refactoring based on simple pattern definitions.

  • Understand ©️ — Code visualization tool that provides code analysis, standards testing, metrics, graphing, dependency analysis and more for Ada, VHDL, and others.

  • Unibeautify ⚠️ — Universal code beautifier with a GitHub app. Supports HTML, CSS, JavaScript, TypeScript, JSX, Vue, C++, Go, Objective-C, Java, Python, PHP, GraphQL, Markdown, and more.

  • Upsource ©️ — Code review tool with static code analysis and code-aware navigation for Java, PHP, JavaScript and Kotlin.

  • Veracode ©️ — Find flaws in binaries and bytecode without requiring source. Support all major programming languages: Java, .NET, JavaScript, Swift, Objective-C, C, C++ and more.

  • WALA — Static analysis capabilities for Java bytecode and related languages and for JavaScript.

  • weggli — A fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases.

  • WhiteHat Application Security Platform ©️ — WhiteHat Scout (for Developers) combined with WhiteHat Sentinel Source (for Operations) supporting WhiteHat Top 40 and OWASP Top 10.

  • Wotan ⚠️ — Pluggable TypeScript and JavaScript linter.

  • XCode ©️ — XCode provides a pretty decent UI for Clang's static code analyzer (C/C++, Obj-C).

Other

  • GitGuardian ggshield — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.
  • kics — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

  • Steampunk Spotter ©️ — Ansible Playbook Scanning Tool that analyzes and offers recommendations for your playbooks.

  • alquitran — Inspects tar archives and tries to spot portability issues in regard to POSIX 2017 pax specification and common tar implementations. This project is intended to be used by maintainers of projects who want to offer portable source code archives for as many systems as possible. Checking tar archives with alquitran before publishing them should help spotting issues before they reach distributors and users.

  • packj — Packj (pronounced package) is a command line (CLI) tool to vet open-source software packages for "risky" attributes that make them vulnerable to supply chain attacks. This is the tool behind our large-scale security analysis platform Packj.dev that continuously vets packages and provides free reports.

  • pure ⚠️ — Pure is a static analysis file format checker that checks ZIP files for dangerous compression ratios, spec deviations, malicious archive signatures, mismatching local and central directory headers, ambiguous UTF-8 filenames, directory and symlink traversals, invalid MS-DOS dates, overlapping headers, overflow, underflow, sparseness, accidental buffer bleeds etc.

  • AzSK — Secure DevOps kit for Azure (AzSK) provides security IntelliSense, Security Verification Tests (SVTs), CICD scan vulnerabilities, compliance issues, and infrastructure misconfiguration in your infrastructure-as-code. Supports Azure via ARM.
  • angr — Binary code analysis tool that also supports symbolic execution.

  • binbloom — Analyzes a raw binary firmware and determines features like endianness or the loading address. The tool is compatible with all architectures. Loading address: binbloom can parse a raw binary firmware and determine its loading address. Endianness: binbloom can use heuristics to determine the endianness of a firmware. UDS Database: binbloom can parse a raw binary firmware and check if it contains an array containing UDS command IDs.

  • BinSkim — A binary static analysis tool that provides security and correctness results for Windows portable executables.

  • Black Duck ©️ — Tool to analyze source code and binaries for reusable code, necessary licenses and potential security aspects.

  • bloaty — Ever wondered what's making your binary big? Bloaty McBloatface will show you a size profile of the binary so you can understand what's taking up space inside. Bloaty performs a deep analysis of the binary. Using custom ELF, DWARF, and Mach-O parsers, Bloaty aims to accurately attribute every byte of the binary to the symbol or compileunit that produced it. It will even disassemble the binary looking for references to anonymous data. F

  • cargo-bloat — Find out what takes most of the space in your executable. supports ELF (Linux, BSD), Mach-O (macOS) and PE (Windows) binaries.

  • cwe_checker — cwe_checker finds vulnerable patterns in binary executables.

  • Ghidra — A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission

  • Hopper ©️ — macOS and Linux reverse engineering tool that lets you disassemble, decompile and debug applications. Hopper displays the code using different representations, e.g. the Control Flow Graph, and the pseudo-code of a procedure. Supports Apple Silicon.

  • IDA Free ©️ — Binary code analysis tool.

  • Jakstab — Jakstab is an Abstract Interpretation-based, integrated disassembly and static analysis framework for designing analyses on executables and recovering reliable control flow graphs.

  • JEB Decompiler ©️ — Decompile and debug binary code. Break down and analyze document files. Android Dalvik, MIPS, ARM, Intel x86, Java, WebAssembly & Ethereum Decompilers.

  • ktool — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.

  • Manalyze — A static analyzer, which checks portable executables for malicious content.

  • mcsema ⚠️ — Framework for lifting x86, amd64, aarch64, sparc32, and sparc64 program binaries to LLVM bitcode. It translates ("lifts") executable binaries from native machine code to LLVM bitcode, which is very useful for performing program analysis methods.

  • Nauz File Detector — Static Linker/Compiler/Tool detector for Windows, Linux and MacOS.

  • rust-audit — Audit Rust binaries for known bugs or security vulnerabilities. This works by embedding data about the dependency tree (Cargo.lock) in JSON format into a dedicated linker section of the compiled executable.

  • Twiggy — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.

  • VMware chap — chap analyzes un-instrumented ELF core files for leaks, memory growth, and corruption. It is sufficiently reliable that it can be used in automation to catch leaks before they are committed. As an interactive tool, it helps explain memory growth, can identify some forms of corruption, and supplements a debugger by giving the status of various memory locations.

  • zydis — Fast and lightweight x86/x86-64 disassembler library

  • checkmake ⚠️ — Linter / Analyzer for Makefiles.

  • portlint — A verifier for FreeBSD and DragonFlyBSD port directories.

  • CSS Stats — Potentially interesting stats on stylesheets.

  • CSScomb — A coding style formatter for CSS. Supports own configurations to make style sheets beautiful and consistent.

  • CSSLint — Does basic syntax checking and finds problematic patterns or signs of inefficiency.

  • GraphMyCSS.com — CSS Specificity Graph Generator.

  • Nu Html Checker — Helps you catch problems in your HTML/CSS/SVG

  • Parker ⚠️ — Stylesheet analysis tool.

  • PostCSS — A tool for transforming styles with JS plugins. These plugins can lint your CSS, support variables and mixins, transpile future CSS syntax, inline images, and more.

  • Project Wallace CSS Analyzer — Analytics for CSS, part of Project Wallace.

  • sass-lint ⚠️ — A Node-only Sass linter for both sass and scss syntax.

  • scsslint — Linter for SCSS files.

  • Specificity Graph — CSS Specificity Graph Generator.

  • Stylelint — Linter for SCSS/CSS files.

  • dotenv-linter — Linting dotenv files like a charm.

  • dotenv-linter (Rust) — Lightning-fast linter for .env files. Written in Rust

  • gixy — A tool to analyze Nginx configuration. The main goal is to prevent misconfiguration and automate flaw detection.

  • ansible-lint — Checks playbooks for practices and behaviour that could potentially be improved.

  • AWS CloudFormation Guard — Check local CloudFormation templates against policy-as-code rules and generate rules from existing templates.

  • AzSK — Secure DevOps kit for Azure (AzSK) provides security IntelliSense, Security Verification Tests (SVTs), CICD scan vulnerabilities, compliance issues, and infrastructure misconfiguration in your infrastructure-as-code. Supports Azure via ARM.

  • cfn-lint — AWS Labs CloudFormation linter.

  • cfn_nag — A linter for AWS CloudFormation templates.

  • checkov — Static analysis tool for Terraform files (tf>=v0.12), preventing cloud misconfigs at build time.

  • cookstyle — Cookstyle is a linting tool based on the RuboCop Ruby linting tool for Chef cookbooks.

  • foodcritic — A lint tool that checks Chef cookbooks for common problems.

  • kics — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

  • metadata-json-lint — Tool to check the validity of Puppet metadata.json files.

  • Puppet Lint ⚠️ — Check that your Puppet manifests conform to the style guide.

  • Steampunk Spotter ©️ — Ansible Playbook Scanning Tool that analyzes and offers recommendations for your playbooks.

  • terraform-compliance — A lightweight, compliance- and security focused, BDD test framework against Terraform.

  • terrascan — Collection of security and best practice tests for static code analysis of Terraform templates.

  • tflint — A Terraform linter for detecting errors that can not be detected by terraform plan.

  • tfsec — Terraform static analysis tool that prevents potential security issues by checking cloud misconfigurations at build time and directly integrates with the HCL parser for better results. Checks for violations of AWS, Azure and GCP security best practice recommendations.

  • anchore — Discover, analyze, and certify container images. A service that analyzes Docker images and applies user-defined acceptance policies to allow automated container image validation and certification

  • clair — Vulnerability Static Analysis for Containers.

  • collector ⚠️ — Run arbitrary scripts inside containers, and gather useful information.

  • dagda ⚠️ — Perform static analysis of known vulnerabilities in docker images/containers.

  • Docker Label Inspector ⚠️ — Lint and validate Dockerfile labels.

  • GitGuardian ggshield — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.

  • Haskell Dockerfile Linter — A smarter Dockerfile linter that helps you build best practice Docker images.

  • kics — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

  • krane ⚠️ — Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition.

  • OpenSCAP — Suite of automated audit tools to examine the configuration and known vulnerabilities following the NIST-certified Security Content Automation Protocol (SCAP).

  • Qualys Container Security ©️ — Container native application protection to provide visibility and control of containerized applications.

  • sysdig ©️ — A secure DevOps platform for cloud and container forensics. Built on an open source stack, Sysdig provides Docker image scanning and created Falco, the open standard for runtime threat detection for containers, Kubernetes and cloud.

  • Vuls — Agent-less Linux vulnerability scanner based on information from NVD, OVAL, etc. It has some container image support, although is not a container specific tool.

  • actionlint — Static checker for GitHub Actions workflow files. Provides an online version.

  • AzSK — Secure DevOps kit for Azure (AzSK) provides security IntelliSense, Security Verification Tests (SVTs), CICD scan vulnerabilities, compliance issues, and infrastructure misconfiguration in your infrastructure-as-code. Supports Azure via ARM.

  • Code Climate — The open and extensible static analysis platform, for everyone.

  • Codecov ©️ — Codecov is a company that provides code coverage tools for developers and engineering leaders to gain visibility into their code coverage. They offer flexible and unified reporting, seamless coverage insights, and robust coverage controls. Codecov supports over 20 languages and is CI/CD agnostic. Over 29,000 organizations and 1 million developers use Codecov. Codecov has recently joined Sentry.

  • CodeRabbit ©️ — AI-powered code review tool that helps developers write better code faster. CodeRabbit provides automated code reviews, identifies security vulnerabilities, and suggests code improvements. It integrates with GitHub and GitLab.

  • composer-dependency-analyser — Fast detection of composer dependency issues.

  • 💪 Powerful: Detects unused, shadow and misplaced composer dependencies
  • ⚡ Performant: Scans 15 000 files in 2s!
  • ⚙️ Configurable: Fine-grained ignores via PHP config
  • 🕸️ Lightweight: No composer dependencies
  • 🍰 Easy-to-use: No config needed for first try
  • ✨ Compatible: PHP >= 7.2
  • Diffblue ©️ — Diffblue is a software company that provides AI-powered code analysis and testing solutions for software development teams. Its technology helps developers automate testing, find bugs, and reduce manual labor in their software development processes. The company's main product, Diffblue Cover, uses AI to generate and run unit tests for Java code, helping to catch errors and improve code quality.

  • exakat — An automated code reviewing engine for PHP.

  • GitGuardian ggshield — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.

  • Goblint — A static analyzer for the analysis of multi-threaded C programs. Its primary focus is the detection of data races, but it also reports other runtime errors, such as buffer overflows and null-pointer dereferences.

  • Nitpick CI ©️ — Automated PHP code review.

  • PullRequest ©️ — Code review as a service with built-in static analysis. Increase velocity and reduce technical debt through quality code review by expert engineers backed by best-in-class automation.

  • quality ⚠️ — Runs quality checks on your code using community tools, and makes sure your numbers don't get any worse over time.

  • QuantifiedCode ⚠️ — Automated code review & repair. It helps you to keep track of issues and metrics in your software projects, and can be easily extended to support new types of analyses.

  • RefactorFirst — Identifies and prioritizes God Classes and Highly Coupled classes in Java codebases you should refactor first.

  • Reviewdog — A tool for posting review comments from any linter in any code hosting service.

  • Symfony Insight ©️ — Detect security risks, find bugs and provide actionable metrics for PHP projects.

  • Violations Lib — Java library for parsing report files from static code analysis. Used by a bunch of Jenkins, Maven and Gradle plugins.

  • oelint-adv — Linter for bitbake recipes used in open-embedded and YOCTO
  • ERB Lint — Lint your ERB or HTML files

  • htmlbeautifier — A normaliser/beautifier for HTML that also understands embedded Ruby. Ideal for tidying up Rails templates.

  • gherkin-lint — A linter for the Gherkin-Syntax written in Javascript.
  • Angular ESLint — Linter for Angular projects

  • Bootlint ⚠️ — An HTML linter for Bootstrap projects.

  • ERB Lint — Lint your ERB or HTML files

  • grunt-bootlint ⚠️ — A Grunt wrapper for Bootlint, the HTML linter for Bootstrap projects.

  • gulp-bootlint ⚠️ — A gulp wrapper for Bootlint, the HTML linter for Bootstrap projects.

  • HTML Inspector ⚠️ — HTML Inspector is a code quality tool to help you and your team write better markup.

  • HTML Tidy — Corrects and cleans up HTML and XML documents by fixing markup errors and upgrading legacy code to modern standards.

  • HTML-Validate — Offline HTML5 validator.

  • htmlbeautifier — A normaliser/beautifier for HTML that also understands embedded Ruby. Ideal for tidying up Rails templates.

  • HTMLHint — A Static Code Analysis Tool for HTML.

  • Nu Html Checker — Helps you catch problems in your HTML/CSS/SVG

  • Polymer-analyzer — A static analysis framework for Web Components.

  • jsonlint — A JSON parser and validator with a CLI. Standalone version of jsonlint.com

  • Spectral — A flexible JSON/YAML linter, with out-of-the-box support for OpenAPI v2/v3 and AsyncAPI v2.

  • chart-testing — ct is the tool for testing Helm charts. It is meant to be used for linting and testing pull requests. It automatically detects charts changed against the target branch.

  • clusterlint — Clusterlint queries live Kubernetes clusters for resources, executes common and platform specific checks against these resources and provides actionable feedback to cluster operators. It is a non invasive tool that is run externally. Clusterlint does not alter the resource configurations.

  • Datree — A CLI tool to prevent Kubernetes misconfigurations by ensuring that manifests and Helm charts follow best practices as well as your organization’s policies

  • kics — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

  • klint — A tool that listens to changes in Kubernetes resources and runs linting rules against them. Identify and debug erroneous objects and nudge objects in line with the policies as both change over time. Klint helps us encode checks and proactively alert teams when they need to take action.

  • krane ⚠️ — Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition.

  • kube-hunter — Hunt for security weaknesses in Kubernetes clusters.

  • kube-lint — A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them.

  • kube-linter — KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.

  • kube-score — Static code analysis of your Kubernetes object definitions.

  • kubeconform — A fast Kubernetes manifests validator with support for custom resources.

It is inspired by, contains code from and is designed to stay close to Kubeval, but with the following improvements:

  • high performance: will validate & download manifests over multiple routines, caching downloaded files in memory
  • configurable list of remote, or local schemas locations, enabling validating Kubernetes custom resources (CRDs) and offline validation capabilities
  • uses by default a self-updating fork of the schemas registry maintained by the kubernetes-json-schema project - which guarantees up-to-date schemas for all recent versions of Kubernetes.
  • KubeLinter — KubeLinter is a static analysis tool that checks Kubernetes YAML files and Helm charts to ensure the applications represented in them adhere to best practices.

  • kubeval — Validates your Kubernetes configuration files and supports multiple Kubernetes versions.

  • ChkTeX — A linter for LaTex which catches some typographic errors LaTeX oversees.

  • lacheck — A tool for finding common mistakes in LaTeX documents.

  • TeXLab — A Language Server Protocol implementation for TeX/LaTeX, including lint capabilities.

  • Enlightn — A static and dynamic analysis tool for Laravel applications that provides recommendations to improve the performance, security and code reliability of Laravel apps. Contains 120 automated checks.

  • larastan — Adds static analysis to Laravel improving developer productivity and code quality. It is a wrapper around PHPStan.

  • checkmake ⚠️ — Linter / Analyzer for Makefiles.

  • portlint — A verifier for FreeBSD and DragonFlyBSD port directories.

  • markdownlint — Node.js -based style checker and lint tool for Markdown/CommonMark files.

  • mdformat — CommonMark compliant Markdown formatter

  • mdl — A tool to check Markdown files and flag style issues.

  • remark-lint — Pluggable Markdown code style linter written in JavaScript.

  • textlint — textlint is an open source text linting utility written in JavaScript.

  • ciocheck ⚠️ — Linter, formatter and test suite helper. As a linter, it is a wrapper around pep8, pydocstyle, flake8, and pylint.

  • flake8 — A wrapper around pyflakes, pycodestyle and mccabe.

  • flakeheaven — flakeheaven is a python linter built around flake8 to enable inheritable and complex toml configuration.

  • Go Meta Linter ⚠️ — Concurrently run Go lint tools and normalise their output. Use golangci-lint for new projects.

  • goreporter — Concurrently runs many linters and normalises their output to a report.

  • multilint ⚠️ — A wrapper around flake8, isort and modernize.

  • prospector — A wrapper around pylint, pep8, mccabe and others.

  • Android Lint — Run static analysis on Android projects.

  • android-lint-summary ⚠️ — Combines lint errors of multiple projects into one output, check lint results of multiple sub-projects at once.

  • FlowDroid — Static taint analysis tool for Android applications.

  • iblessing ⚠️ — iblessing is an iOS security exploiting toolkit. It can be used for reverse engineering, binary analysis and vulnerability mining.

  • Mariana Trench — Our security focused static analysis tool for Android and Java applications. Mariana Trench analyzes Dalvik bytecode and is built to run fast on large codebases (10s of millions of lines of code). It can find vulnerabilities as code changes, before it ever lands in your repository.

  • Oversecured ©️ — Enterprise vulnerability scanner for Android and iOS apps. It allows app owners and developers to secure each new version of a mobile app by integrating Oversecured into the development process.

  • paprika ⚠️ — A toolkit to detect some code smells in analyzed Android applications.

  • qark ⚠️ — Tool to look for several security related Android application vulnerabilities.

  • redex — Redex provides a framework for reading, writing, and analyzing .dex files, and a set of optimization passes that use this framework to improve the bytecode. An APK optimized by Redex should be smaller and faster.

  • deadnix — Scan Nix files for dead code (unused variable bindings)

  • statix — Lints and suggestions for the Nix programming language. "statix check" highlights antipatterns in Nix code. "statix fix" can fix several such occurrences.

  • lockfile-lint — Lint an npm or yarn lockfile to analyze and detect security issues

  • njsscan — A static application testing (SAST) tool that can find insecure code patterns in your node.js applications using simple pattern matcher from libsast and syntax-aware semantic code pattern search tool semgrep.

  • NodeJSScan ⚠️ — A static security code scanner for Node.js applications powered by libsast and semgrep that builds on the njsscan cli tool. It features a UI with various dashboards about an application's security status.

  • standard — An npm module that checks for Javascript Styleguide issues.

  • 💪 Powerful: Detects unused, shadow and misplaced composer dependencies
  • ⚡ Performant: Scans 15 000 files in 2s!
  • ⚙️ Configurable: Fine-grained ignores via PHP config
  • 🕸️ Lightweight: No composer dependencies
  • 🍰 Easy-to-use: No config needed for first try
  • ✨ Compatible: PHP >= 7.2
  • lintian — Static analysis tool for Debian packages.

  • rpmlint — Tool for checking common errors in rpm packages.

  • promformat ⚠️ — Promformat is a PromQL formatter written in Python.

  • promval ⚠️ — PromQL validator written in Python. It can be used to validate that PromQL expressions are written as expected.

  • buf — Provides a CLI linter that enforces good API design choices and structure

  • protolint — Pluggable linter and fixer to enforce Protocol Buffer style and conventions.

  • dawnscanner — A static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
  • AzSK — Secure DevOps kit for Azure (AzSK) provides security IntelliSense, Security Verification Tests (SVTs), CICD scan vulnerabilities, compliance issues, and infrastructure misconfiguration in your infrastructure-as-code. Supports Azure via ARM.

  • brakeman — A static analysis security vulnerability scanner for Ruby on Rails applications.

  • Credential Digger — Credential Digger is a GitHub scanning tool that identifies hardcoded credentials (Passwords, API Keys, Secret Keys, Tokens, personal information, etc), and filtering the false positive data through a machine learning model called Password Model. This scanner is able to detect passwords and non structured tokens with a low false positive rate.

  • Datree — A CLI tool to prevent Kubernetes misconfigurations by ensuring that manifests and Helm charts follow best practices as well as your organization’s policies

  • detect-secrets — An enterprise friendly way of detecting and preventing secrets in code. It does this by running periodic diff outputs against heuristically crafted regex statements, to identify whether any new secret has been committed. This way, it avoids the overhead of digging through all git history, as well as the need to scan the entire repository every time.

  • Enlightn — A static and dynamic analysis tool for Laravel applications that provides recommendations to improve the performance, security and code reliability of Laravel apps. Contains 120 automated checks.

  • GitGuardian ggshield — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.

  • Gitleaks — A SAST tool for detecting hardcoded secrets like passwords, api keys, and tokens in git repos.

  • gokart — Golang security analysis with a focus on minimizing false positives. It is capable of tracing the source of variables and function arguments to determine whether input sources are safe.

  • HasMySecretLeaked ©️ — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.

  • iblessing ⚠️ — iblessing is an iOS security exploiting toolkit. It can be used for reverse engineering, binary analysis and vulnerability mining.

  • kani — The Kani Rust Verifier is a bit-precise model checker for Rust. Kani is particularly useful for verifying unsafe code blocks in Rust, where the "unsafe superpowers" are unchecked by the compiler. Kani verifies:

  • Memory safety (e.g., null pointer dereferences)
  • User-specified assertions (i.e., assert!(...))
  • The absence of panics (e.g., unwrap() on None values)
  • The absence of some types of unexpected behavior (e.g., arithmetic overflows)
  • kics — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

  • ktool — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.

  • kube-hunter — Hunt for security weaknesses in Kubernetes clusters.

  • lockfile-lint — Lint an npm or yarn lockfile to analyze and detect security issues

  • LunaSec — Open Source AppSec platform that automatically notifies you the next time vulnerabilities like Log4Shell or node-ipc happen. Track your dependencies and builds in a centralized service.

  • njsscan — A static application testing (SAST) tool that can find insecure code patterns in your node.js applications using simple pattern matcher from libsast and syntax-aware semantic code pattern search tool semgrep.

  • NodeJSScan ⚠️ — A static security code scanner for Node.js applications powered by libsast and semgrep that builds on the njsscan cli tool. It features a UI with various dashboards about an application's security status.

  • Oversecured ©️ — Enterprise vulnerability scanner for Android and iOS apps. It allows app owners and developers to secure each new version of a mobile app by integrating Oversecured into the development process.

  • PT Application Inspector ©️ — Identifies code flaws and detects vulnerabilities to prevent web attacks. Demonstrates remote code execution by presenting possible exploits.

  • Qualys Container Security ©️ — Container native application protection to provide visibility and control of containerized applications.

  • QuantifiedCode ⚠️ — Automated code review & repair. It helps you to keep track of issues and metrics in your software projects, and can be easily extended to support new types of analyses.

  • Rezilion ©️ — Discovers vulnerabilities for all components in your environment, filters out 85% non-exploitable vulnerabilities and creates a remediation plan and open tickets to upgrade components that violate your security policy and/or patch automatically in CI.

  • scorecard — Security Scorecards - Security health metrics for Open Source

  • SearchDiggity ©️ — Identifies vulnerabilities in open source code projects hosted on Github, Google Code, MS CodePlex, SourceForge, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, etc.

  • Steampunk Spotter ©️ — Ansible Playbook Scanning Tool that analyzes and offers recommendations for your playbooks.

  • Symfony Insight ©️ — Detect security risks, find bugs and provide actionable metrics for PHP projects.

  • tfsec — Terraform static analysis tool that prevents potential security issues by checking cloud misconfigurations at build time and directly integrates with the HCL parser for better results. Checks for violations of AWS, Azure and GCP security best practice recommendations.

  • trufflehog — Find credentials all over the place TruffleHog is an open source secret-scanning engine that resolves exposed secrets across your company’s entire tech stack.

  • Tsunami Security Scanner — A general purpose network security scanner with an extensible plugin system for detecting high severity RCE-like vulnerabilities with high confidence. Custom detectors for finding vulnerabilities (e.g. open APIs) can be added.

  • mythril — A symbolic execution framework with batteries included, can be used to find and exploit vulnerabilities in smart contracts automatically.

  • MythX ©️ — MythX is an easy to use analysis platform which integrates several analysis methods like fuzzing, symbolic execution and static analysis to find vulnerabilities with high precision. It can be integrated with toolchains like Remix or VSCode or called from the command-line.

  • slither — Static analysis framework that runs a suite of vulnerability detectors, prints visual information about contract details, and provides an API to easily write custom analyses.

  • solhint — Solhint is an open source project created by https://protofire.io. Its goal is to provide a linting utility for Solidity code.

  • solium — Solium is a linter to identify and fix style and security issues in Solidity smart contracts.

  • LibVCS4j — A Java library that allows existing tools to analyse the evolution of software systems by providing a common API for different version control systems and issue trackers.

  • RefactorFirst — Identifies and prioritizes God Classes and Highly Coupled classes in Java codebases you should refactor first.

  • Violations Lib — Java library for parsing report files from static code analysis. Used by a bunch of Jenkins, Maven and Gradle plugins.

  • ember-template-lint — Linter for Ember or Handlebars templates.

  • haml-lint — Tool for writing clean and consistent HAML.

  • slim-lint — Configurable tool for analyzing Slim templates.

  • yamllint — Checks YAML files for syntax validity, key repetition and cosmetic problems such as lines length, trailing spaces, and indentation.

  • GitGuardian ggshield — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.

  • kics — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible

  • shisho ⚠️ — A lightweight static code analyzer designed for developers and security teams. It allows you to analyze and transform source code with an intuitive DSL similar to sed, but for code.

  • dennis — A set of utilities for working with PO files to ease development and improve quality.
  • HTML-Validate — Offline HTML5 validator.

  • Vetur ⚠️ — Vue tooling for VS Code, powered by vls (vue language server). Vetur has support for formatting embedded HTML, CSS, SCSS, JS, TypeScript, and more. Vetur only has a "whole document formatter" and cannot format arbitrary ranges.

  • Twiggy — Analyzes a binary's call graph to profile code size. The goal is to slim down wasm binary size.
  • After the Deadline ⚠️ — Spell, style and grammar checker.

  • alex — Catch insensitive, inconsiderate writing

  • codespell — Check code for common misspellings.

  • languagetool — Style and grammar checker for 25+ languages. It finds many errors that a simple spell checker cannot detect.

  • misspell-fixer ⚠️ — Quick tool for fixing common misspellings, typos in source code.

  • Misspelled Words In Context — A spell-checker that groups possible misspellings and shows them in their contexts.

  • proselint — A linter for English prose with a focus on writing style instead of grammar.

  • vale — A syntax-aware linter for prose built with speed and extensibility in mind.

  • write-good — A linter with a focus on eliminating "weasel words".

  • Spectral — A flexible JSON/YAML linter, with out-of-the-box support for OpenAPI v2/v3 and AsyncAPI v2.

  • yamllint — Checks YAML files for syntax validity, key repetition and cosmetic problems such as lines length, trailing spaces, and indentation.

  • commitlint — checks if your commit messages meet the conventional commit format

  • GitGuardian ggshield — ggshield is a CLI application that runs in your local environment or in a CI environment to help you detect more than 350+ types of secrets, as well as other potential security vulnerabilities or policy breaks affecting your codebase.

  • HasMySecretLeaked ©️ — HasMySecretLeaked is a project from GitGuardian that aims to help individual users and organizations search across 20 million exposed secrets to verify if their developer secrets have leaked on public repositories, gists, and issues on GitHub projects.

More Collections

License

CC0

To the extent possible under law, Matthias Endler has waived all copyright and related or neighboring rights to this work. The underlying source code used to format and display that content is licensed under the MIT license.

Title image Designed by Freepik.