DependencyCheck
Spotbugs
DependencyCheck | Spotbugs | |
---|---|---|
11 | 18 | |
5,891 | 3,347 | |
- | 0.8% | |
9.5 | 9.6 | |
4 days ago | 4 days ago | |
Java | Java | |
Apache License 2.0 | GNU Lesser General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
DependencyCheck
- OWASP dependency check (<9.0.0) could fail to work after Dec 15th, 2023
-
How To Secure Your JavaScript Applications
Use Security Tools: To identify known vulnerabilities in your project's dependencies, you can utilize commands like npm audit or employ third-party security scanners such as DependencyCheck or Dependabot. These tools thoroughly analyze the dependency tree and offer actionable insights to assist you in resolving any identified vulnerabilities.
-
Do you use dependency analysis and vulnerability detection tools?
OWASP DependencyCheck - a really decent tool for scanning your project for vulnerable dependencies. It is actively developed and updated and up to date with the most latest vulnerabilities. Sometimes it can be a pain in the ass, though. Some security researchers and such find a vulnerability, publish it and the next day our CI/CD pipelines fail (the dependency check build step prevents the code from going to production). And not always there is a fix available. So, some vulnerabilities have to be ignored, temporarily. Also, to be able to ignore a vulnerability one has to do a fast risk assessment. And that will require from him to read about the vulnerability and decide if it is safe to be ignored or some different workaround must be found.
-
The ultimate guide to Java Security Vulnerabilities (CVE)
The ultimate guide somehow fails to mention the best CVE checker: https://github.com/jeremylong/DependencyCheck
-
Is Clojure suitable for my use cases?
We run https://github.com/jeremylong/DependencyCheck over our dependency tree regularly, via this Clojure wrapper: https://github.com/clj-holmes/clj-watson which tells us the dependency tree path to each item that has a CVE and also the version in which the CVE is addressed, if known.
-
Gitlab community dependency scanning
We use OWASP dependency-check and pass reports to SonarQube.
-
Security in CICD / DevSecOps
From OWASP for those class of tools you could look into DependencyCheck and DependencyTrack
- Is there a tool to track CVEs for the software that we use?
-
Does anybody know any good materials for java defensive coding please?.
DependencyCheck is an open source tool that checks for vulnerabilities in dependencies used within a project. While it is a reactive tool, it's an important one since the code a developer writes is not the only code an application uses.
-
Are there any tools I can use to safely upgrade my Nuget packages? What are some strategies I can incorporate?
One more aspect to consider, although I know it is not the primary ask of the post, is to be sure and run something like dependency check on your repository. There are quite a few vulnerabilities being injected through the packaging process these days.
Spotbugs
-
Handling EI_EXPOSE_REP & EI_EXPOSE_REP2 π¨π»βπ»
SpotBugs is a great tool for static code analysis. Recently I got two similar warnings in one of the codebases I work on and I had to fix it.
- Primeiros passos no desenvolvimento Java em 2023: um guia particular
-
Static Code Analyzer for JAVA development: any recommendations ??
SpotBugs is pretty good.
-
Ask HN: What is a modern Java environment?
PMD, Spotbugs, Nullaway: Java linting/static analysis (https://pmd.github.io, https://spotbugs.github.io, https://github.com/uber/NullAway)
- What are some useful static analyzers for Java?
- Go CheckLocks Analyzer
-
Is there a tool to track CVEs for the software that we use?
While at it you could also point them to static code analyzers such as error_prone, spotbugs and pmd (use all 3 at once - they complement each other in detecting different issues).
-
SpotBugs supports SARIF that supports integration with other SAST tools
First, it's better to use SpotBugs 4.4.1 and above, that includes a fix to make SARIF report compatible with Github code scanning API requirements.
-
Needing to run GUI application from java docker image
RUN wget https://github.com/spotbugs/spotbugs/releases/download/4.4.1/spotbugs-4.4.1.tgz
-
Looking for a Static Code Analysis tool for Scala Code
If you donβt have checkmarx/Vera code money, have you looked at https://find-sec-bugs.github.io/? It can be used with a few things such as https://spotbugs.github.io/ and sonarQ
What are some alternatives?
dependency-track - Dependency-Track is an intelligent Component Analysis platform that allows organizations to identify and reduce risk in the software supply chain.
SonarQube - Continuous Inspection
FindBugs - The new home of the FindBugs project
opencve - CVE Alerting Platform
PMD - An extensible multilanguage static code analyzer.
openvas-scanner - This repository contains the scanner component for Greenbone Community Edition.
Error Prone - Catch common Java mistakes as compile-time errors
uml-reverse-mapper - Automatically generate class diagram from code. Supports Graphviz, PlantUML and Mermaid output formats.
Checkstyle - Checkstyle is a development tool to help programmers write Java code that adheres to a coding standard. By default it supports the Google Java Style Guide and Sun Code Conventions, but is highly configurable. It can be invoked with an ANT task and a command line program.
slsa - Supply-chain Levels for Software Artifacts
SonarJava - :coffee: SonarSource Static Analyzer for Java Code Quality and Security