Skip to content

Commit aacc0d2

Browse files
author
Analysis Tools Bot
committed
Commit list
1 parent 4569f4d commit aacc0d2

File tree

2 files changed

+61
-7
lines changed

2 files changed

+61
-7
lines changed

README.md

+7-4
Original file line numberDiff line numberDiff line change
@@ -1093,7 +1093,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
10931093

10941094
- [cane](https://github.com/square/cane) :warning: — Code quality threshold checking as part of your build.
10951095

1096-
- [Churn](https://github.com/danmayer/churn) — A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.
1096+
- [Churn](https://github.com/danmayer/churn) :warning: — A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.
10971097

10981098
- [dawnscanner](https://github.com/thesp0nge/dawnscanner) — A static analysis security scanner for ruby written web applications. It supports Sinatra, Padrino and Ruby on Rails frameworks.
10991099

@@ -1168,7 +1168,7 @@ YAPF follows a distinctive methodology, originating from the 'clang-format' tool
11681168

11691169
- [cargo-expand](https://github.com/dtolnay/cargo-expand) — Cargo subcommand to show result of macro expansion and #[derive] expansion applied to the current crate. This is a wrapper around a more verbose compiler command.
11701170

1171-
- [cargo-geiger](https://github.com/geiger-rs/cargo-geiger) — A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing
1171+
- [cargo-geiger](https://github.com/geiger-rs/cargo-geiger) :warning: — A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing
11721172

11731173
- [cargo-inspect](https://github.com/mre/cargo-inspect) :warning: — Inspect Rust code without syntactic sugar to see what the compiler does behind the curtains.
11741174

@@ -1382,6 +1382,9 @@ TSLint is an extensible static analysis tool that checks TypeScript code for rea
13821382

13831383
- [ArchUnit](https://www.archunit.org) — Unit test your Java or Kotlin architecture.
13841384

1385+
- [ast-grep](https://ast-grep.github.io/) — ast-grep is a powerful tool designed for managing code at scale using Abstract Syntax Trees (AST). Think of it as a hybrid of grep, eslint, and codemod, with the ability to search, lint, and rewrite code based on its structure rather than plain text.
1386+
It supports multiple languages and is designed to be extensible, allowing you to register custom languages.
1387+
13851388
- [Atom-Beautify](https://atom.io/packages/atom-beautify) :warning: — Beautify HTML, CSS, JavaScript, PHP, Python, Ruby, Java, C, C++, C#, Objective-C, CoffeeScript, TypeScript, Coldfusion, SQL, and more in Atom editor.
13861389

13871390
- [autocorrect](https://huacnlee.github.io/autocorrect) — A linter and formatter to help you to improve copywriting, correct spaces, words, punctuations between CJK (Chinese, Japanese, Korean).
@@ -1986,7 +1989,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l
19861989
- [krane](https://github.com/appvia/krane) — Krane is a simple Kubernetes RBAC static analysis tool.
19871990
It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition.
19881991

1989-
- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters.
1992+
- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) :warning: — Hunt for security weaknesses in Kubernetes clusters.
19901993

19911994
- [kube-lint](https://github.com/viglesiasce/kube-lint) — A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them.
19921995

@@ -2211,7 +2214,7 @@ Kani verifies:
22112214

22122215
- [ktool](https://ktool.cynder.me/en/latest/ktool.html) — Fully cross-platform toolkit and library for MachO+Obj-C editing/analysis. Includes a cli kit, a curses GUI, ObjC header dumping, and much more.
22132216

2214-
- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters.
2217+
- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) :warning: — Hunt for security weaknesses in Kubernetes clusters.
22152218

22162219
- [lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues
22172220

data/api/tools.json

+54-3
Original file line numberDiff line numberDiff line change
@@ -638,6 +638,57 @@
638638
"demos": null,
639639
"wrapper": null
640640
},
641+
"ast-grep": {
642+
"name": "ast-grep",
643+
"categories": [
644+
"linter"
645+
],
646+
"languages": [
647+
"c",
648+
"csharp",
649+
"go",
650+
"java",
651+
"javascript",
652+
"jsx",
653+
"kotlin",
654+
"lua",
655+
"python",
656+
"ruby",
657+
"rust",
658+
"typescript"
659+
],
660+
"other": [
661+
"json",
662+
"yaml"
663+
],
664+
"licenses": [
665+
"MIT"
666+
],
667+
"types": [
668+
"cli",
669+
"ide-plugin"
670+
],
671+
"homepage": "https://ast-grep.github.io/",
672+
"source": "https://github.com/ast-grep/ast-grep",
673+
"pricing": null,
674+
"plans": null,
675+
"description": "ast-grep is a powerful tool designed for managing code at scale using Abstract Syntax Trees (AST). Think of it as a hybrid of grep, eslint, and codemod, with the ability to search, lint, and rewrite code based on its structure rather than plain text.\nIt supports multiple languages and is designed to be extensible, allowing you to register custom languages.",
676+
"discussion": null,
677+
"deprecated": null,
678+
"resources": [
679+
{
680+
"title": "ast-grep Quick Start Guide",
681+
"url": "https://ast-grep.github.io/guide/quick-start.html"
682+
}
683+
],
684+
"reviews": [
685+
"https://stackshare.io/ast-grep"
686+
],
687+
"demos": [
688+
"https://ast-grep.github.io/playground.html"
689+
],
690+
"wrapper": null
691+
},
641692
"astree": {
642693
"name": "Astrée",
643694
"categories": [
@@ -1904,7 +1955,7 @@
19041955
"plans": null,
19051956
"description": "A cargo plugin for analysing the usage of unsafe Rust code Provides statistical output to aid security auditing",
19061957
"discussion": null,
1907-
"deprecated": null,
1958+
"deprecated": true,
19081959
"resources": null,
19091960
"reviews": null,
19101961
"demos": null,
@@ -2429,7 +2480,7 @@
24292480
"plans": null,
24302481
"description": "A Project to give the churn file, class, and method for a project for a given checkin. Over time the tool adds up the history of churns to give the number of times a file, class, or method is changing during the life of a project.",
24312482
"discussion": null,
2432-
"deprecated": null,
2483+
"deprecated": true,
24332484
"resources": null,
24342485
"reviews": null,
24352486
"demos": null,
@@ -10387,7 +10438,7 @@
1038710438
"plans": null,
1038810439
"description": "Hunt for security weaknesses in Kubernetes clusters.",
1038910440
"discussion": null,
10390-
"deprecated": null,
10441+
"deprecated": true,
1039110442
"resources": null,
1039210443
"reviews": null,
1039310444
"demos": null,

0 commit comments

Comments
 (0)