sqlvet VS grype

Compare sqlvet vs grype and see what are their differences.

sqlvet

Go fearless SQL. Sqlvet performs static analysis on raw SQL queries in your Go code base. (by houqp)
Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
sqlvet grype
1 55
483 7,583
- 3.4%
3.6 9.5
7 days ago about 10 hours ago
Go Go
MIT License Apache License 2.0
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

sqlvet

Posts with mentions or reviews of sqlvet. We have used some of these posts to build our list of alternatives and similar projects.

We haven't tracked posts mentioning sqlvet yet.
Tracking mentions began in Dec 2020.

grype

Posts with mentions or reviews of grype. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2024-03-20.

What are some alternatives?

When comparing sqlvet and grype you can also consider the following projects:

trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more

anchore-engine - A service that analyzes docker images and scans for vulnerabilities

clair - Vulnerability Static Analysis for Containers

syft - CLI tool and library for generating a Software Bill of Materials from container images and filesystems

opencve - CVE Alerting Platform

falco - Cloud Native Runtime Security

kubescape - Kubescape is an open-source Kubernetes security platform for your IDE, CI/CD pipelines, and clusters. It includes risk analysis, security, compliance, and misconfiguration scanning, saving Kubernetes users and administrators precious time, effort, and resources.

kube-bench - Checks whether Kubernetes is deployed according to security best practices as defined in the CIS Kubernetes Benchmark

hadolint - Dockerfile linter, validate inline bash, written in Haskell

checkov - Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.

lynis - Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.

documentation - Kata Containers version 1.x documentation (for version 2.x see https://github.com/kata-containers/kata-containers).