TrojanSourceFinder
🔎 Help find Trojan Source vulnerability in code 👀 . Useful for code review in project with multiple collaborators (CI/CD) (by ariary)
trojan-source
Trojan Source: Invisible Vulnerabilities (by nickboucher)
TrojanSourceFinder | trojan-source | |
---|---|---|
1 | 21 | |
46 | 1,215 | |
- | - | |
0.0 | 3.6 | |
5 months ago | about 1 year ago | |
Go | SCSS | |
MIT License | MIT License |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
TrojanSourceFinder
Posts with mentions or reviews of TrojanSourceFinder.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2021-11-10.
-
The Invisible JavaScript Backdoor
Bonus: if you interested in look at Trojan-source (similar examples) and TrojanSourceFinder (tool to detect them)
trojan-source
Posts with mentions or reviews of trojan-source.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-12-25.
- Trojan Source Attacks (2021)
- What is some niche/ quirky python code you know?
-
Android Studio’s “Code contains easter egg” inspection (2019)
Is this one of those trojan source attacks in the wild?
https://trojansource.codes/
-
So, it seems there will be another issue, different than the 32 bit time thing
see this github repo fkr examples
- ​
- Trojan Source: Invisible Vulnerabilities
-
The Invisible JavaScript Backdoor
Bonus: if you interested in look at Trojan-source (similar examples) and TrojanSourceFinder (tool to detect them)
Works for me with the examples from https://github.com/nickboucher/trojan-source
-
A h4cker just cr4shed a match with special characters in text chat. I got an abandon and lost hard earned elo
This is coming out of a team at Cambridge. Read up on it here Trojan source
- Trojan Source – Invisible Source Code Vulnerabilities
What are some alternatives?
When comparing TrojanSourceFinder and trojan-source you can also consider the following projects:
sx - :vulcan_salute: Fast, modern, easy-to-use network scanner
mvregex
policy-bot - A GitHub App that enforces approval policies on pull requests
aboriginal - Aboriginal Generics: the future is here!
tfsec - Security scanner for your Terraform code
vim-troll-stopper - Stop Unicode trolls from messing with your code.
werf - A solution for implementing efficient and consistent software delivery to Kubernetes facilitating best practices.
rust - Empowering everyone to build reliable and efficient software.
Gitkube - Build and deploy docker images to Kubernetes using git push
vscode-gremlins - Gremlins tracker for Visual Studio Code: reveals invisible whitespace and other annoying characters