You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+7-4
Original file line number
Diff line number
Diff line change
@@ -1093,7 +1093,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
1093
1093
1094
1094
-[cane](https://github.com/square/cane):warning: — Code quality threshold checking as part of your build.
1095
1095
1096
-
-[Churn](https://github.com/danmayer/churn) — A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.
1096
+
-[Churn](https://github.com/danmayer/churn):warning:— A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.
1097
1097
1098
1098
-[dawnscanner](https://github.com/thesp0nge/dawnscanner) — A static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
1099
1099
@@ -1168,7 +1168,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
1168
1168
1169
1169
-[cargo-expand](https://github.com/dtolnay/cargo-expand) — Cargo subcommand to show result of macro expansion and #[derive] expansion applied to the current crate. This is a wrapper around a more verbose compiler command.
1170
1170
1171
-
-[cargo-geiger](https://github.com/geiger-rs/cargo-geiger) — A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing
1171
+
-[cargo-geiger](https://github.com/geiger-rs/cargo-geiger):warning:— A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing
1172
1172
1173
1173
-[cargo-inspect](https://github.com/mre/cargo-inspect):warning: — Inspect Rust code without syntactic sugar to see what the compiler does behind the curtains.
1174
1174
@@ -1382,6 +1382,9 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
1382
1382
1383
1383
-[ArchUnit](https://www.archunit.org) — Unit test your Java or Kotlin architecture.
1384
1384
1385
+
-[ast-grep](https://ast-grep.github.io/) — ast-grep is a powerful tool designed for managing code at scale using Abstract Syntax Trees (AST). Think of it as a hybrid of grep, eslint, and codemod, with the ability to search, lint, and rewrite code based on its structure rather than plain text.
1386
+
It supports multiple languages and is designed to be extensible, allowing you to register custom languages.
1387
+
1385
1388
-[Atom-Beautify](https://atom.io/packages/atom-beautify):warning: — Beautify HTML, CSS, JavaScript, PHP, Python, Ruby, Java, C, C++, C#, Objective-C, CoffeeScript, TypeScript, Coldfusion, SQL, and more in Atom editor.
1386
1389
1387
1390
-[autocorrect](https://huacnlee.github.io/autocorrect) — A linter and formatter to help you to improve copywriting, correct spaces, words, punctuations between CJK (Chinese, Japanese, Korean).
@@ -1986,7 +1989,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
1986
1989
-[krane](https://github.com/appvia/krane) — Krane is a simple Kubernetes RBAC static analysis tool.
1987
1990
It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition.
1988
1991
1989
-
-[kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters.
1992
+
-[kube-hunter](https://aquasecurity.github.io/kube-hunter/):warning:— Hunt for security weaknesses in Kubernetes clusters.
1990
1993
1991
1994
-[kube-lint](https://github.com/viglesiasce/kube-lint) — A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them.
1992
1995
@@ -2211,7 +2214,7 @@ Kani verifies:
2211
2214
2212
2215
-[ktool](https://ktool.cynder.me/en/latest/ktool.html) — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.
2213
2216
2214
-
-[kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters.
2217
+
-[kube-hunter](https://aquasecurity.github.io/kube-hunter/):warning:— Hunt for security weaknesses in Kubernetes clusters.
2215
2218
2216
2219
-[lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues
"description": "ast-grep is a powerful tool designed for managing code at scale using Abstract Syntax Trees (AST). Think of it as a hybrid of grep, eslint, and codemod, with the ability to search, lint, and rewrite code based on its structure rather than plain text.\nIt supports multiple languages and is designed to be extensible, allowing you to register custom languages.",
"description": "A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing",
1906
1957
"discussion": null,
1907
-
"deprecated": null,
1958
+
"deprecated": true,
1908
1959
"resources": null,
1909
1960
"reviews": null,
1910
1961
"demos": null,
@@ -2429,7 +2480,7 @@
2429
2480
"plans": null,
2430
2481
"description": "A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.",
2431
2482
"discussion": null,
2432
-
"deprecated": null,
2483
+
"deprecated": true,
2433
2484
"resources": null,
2434
2485
"reviews": null,
2435
2486
"demos": null,
@@ -10387,7 +10438,7 @@
10387
10438
"plans": null,
10388
10439
"description": "Hunt for security weaknesses in Kubernetes clusters.",
0 commit comments