diff --git a/README.md b/README.md index 4bc7bd1a86..2cf9eaac0c 100644 --- a/README.md +++ b/README.md @@ -885,7 +885,7 @@ A ktfmt IntelliJ plugin is available from the plugin repository. To install it, - [phpDocumentor](https://www.phpdoc.org) — Analyzes PHP source code to generate documentation. -- [phploc](https://github.com/sebastianbergmann/phploc) — A tool for quickly measuring the size and analyzing the structure of a PHP project. +- **phploc** :warning: — A tool for quickly measuring the size and analyzing the structure of a PHP project. - [PHPMD](https://phpmd.org) — Finds possible bugs in your code. @@ -1608,6 +1608,8 @@ orchestration to ensure zero breaking changes. Specialized for React, Next.js, a - [RIPS](https://www.ripstech.com) :copyright: — A static source code analyser for vulnerabilities in PHP scripts. +- [rma-cli](https://crates.io/crates/rma-cli) — Fast SAST scanner written in Rust that compiles Semgrep rules to native tree-sitter matchers for 10x faster scanning. Supports 647+ security rules covering OWASP Top 10, CWE, and more across 28 programming languages. Outputs SARIF/JSON for CI/CD integration. + - [Roslyn Analyzers](https://github.com/dotnet/roslyn-analyzers) — Roslyn-based implementation of FxCop analyzers. - [Roslyn Security Guard](https://security-code-scan.github.io) — Project that focuses on the identification of potential vulnerabilities such as SQL injection, cross-site scripting (XSS), CSRF, cryptography weaknesses, hardcoded passwords and many more. @@ -2068,7 +2070,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l - [krane](https://github.com/appvia/krane) — Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition. -- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters. +- **kube-hunter** :warning: — Hunt for security weaknesses in Kubernetes clusters. - [kube-lint](https://github.com/viglesiasce/kube-lint) — A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them. @@ -2313,7 +2315,7 @@ Kani verifies: - [kics](https://kics.io/) — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible -- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters. +- **kube-hunter** :warning: — Hunt for security weaknesses in Kubernetes clusters. - [lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues diff --git a/data/api/tools.json b/data/api/tools.json index af1ff65397..f822cae603 100644 --- a/data/api/tools.json +++ b/data/api/tools.json @@ -11001,7 +11001,7 @@ "plans": null, "description": "Hunt for security weaknesses in Kubernetes clusters.", "discussion": null, - "deprecated": null, + "deprecated": true, "resources": null, "reviews": null, "demos": null, @@ -14616,7 +14616,7 @@ "plans": null, "description": "A tool for quickly measuring the size and analyzing the structure of a PHP project.", "discussion": null, - "deprecated": null, + "deprecated": true, "resources": null, "reviews": null, "demos": null, @@ -17249,6 +17249,48 @@ "demos": null, "wrapper": null }, + "rma-cli": { + "name": "rma-cli", + "categories": [ + "linter" + ], + "languages": [ + "c", + "csharp", + "cpp", + "go", + "java", + "javascript", + "kotlin", + "php", + "python", + "ruby", + "rust", + "scala", + "swift", + "typescript" + ], + "other": [ + "security" + ], + "licenses": [ + "MIT" + ], + "types": [ + "cli" + ], + "homepage": "https://crates.io/crates/rma-cli", + "source": "https://github.com/bumahkib7/rust-monorepo-analyzer", + "pricing": null, + "plans": null, + "description": "Fast SAST scanner written in Rust that compiles Semgrep rules to native tree-sitter matchers for 10x faster scanning. Supports 647+ security rules covering OWASP Top 10, CWE, and more across 28 programming languages. Outputs SARIF/JSON for CI/CD integration.", + "discussion": null, + "deprecated": null, + "resources": null, + "reviews": null, + "demos": null, + "wrapper": null + }, "roodi": { "name": "Roodi", "categories": [ diff --git a/data/tools/rma-cli.yml b/data/tools/rma-cli.yml new file mode 100644 index 0000000000..da730d4687 --- /dev/null +++ b/data/tools/rma-cli.yml @@ -0,0 +1,29 @@ +name: rma-cli +categories: + - linter +tags: + - c + - cpp + - csharp + - go + - java + - javascript + - kotlin + - php + - python + - ruby + - rust + - scala + - security + - swift + - typescript +license: MIT +types: + - cli +source: 'https://github.com/bumahkib7/rust-monorepo-analyzer' +homepage: 'https://crates.io/crates/rma-cli' +description: >- + Fast SAST scanner written in Rust that compiles Semgrep rules to native + tree-sitter matchers for 10x faster scanning. Supports 647+ security rules + covering OWASP Top 10, CWE, and more across 28 programming languages. + Outputs SARIF/JSON for CI/CD integration.