Malicious-code-ruleset Alternatives

Similar projects and alternatives to malicious-code-ruleset

  1. vite

    Next generation frontend tooling. It's fast!

  2. InfluxDB

    InfluxDB – Built for High-Performance Time Series Workloads. InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.

    InfluxDB logo
  3. opensnitch

    OpenSnitch is a GNU/Linux interactive application firewall inspired by Little Snitch.

  4. firejail

    Linux namespaces and seccomp-bpf sandbox

  5. checkout

    Action for checking out a repo

  6. scorecard

    OpenSSF Scorecard - Security health metrics for Open Source

  7. changed-files

    :octocat: Github action to retrieve all (added, copied, modified, deleted, renamed, type changed, unmerged, unknown) files and directories.

  8. harden-runner

    Harden-Runner is a CI/CD security agent that works like an EDR for GitHub Actions runners. It monitors network egress, file integrity, and process activity on those runners, detecting threats in real-time.

  9. Stream

    Stream - Scalable APIs for Chat, Feeds, Moderation, & Video. Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure.

    Stream logo
  10. vet

    Next Generation Software Composition Analysis (SCA) with Malicious Package Detection, Code Context & Policy as Code

  11. PRevent

    Prevent merging of malicious code in pull requests

  12. autogrep

    Autogrep automates Semgrep rule generation and filtering by using LLMs to analyze vulnerability patches, enabling automatic creation of high-quality security rules without manual curation.

  13. changed-files

    Github action to retrieve all (added, copied, modified, deleted, renamed, type changed, unmerged, unknown) files and directories. Secure drop-in replacement for tj-actions/changed-files. (by step-security)

  14. paths-filter

    Conditionally run actions based on files modified by PR, feature branch or pushed commits. Secure drop-in replacement for dorny/paths-filter. (by step-security)

  15. introspector

    A schema and set of tools for using SQL to query cloud infrastructure.

  16. gh-action-pypi-publish

    The blessed :octocat: GitHub Action, for publishing your :package: distribution files to PyPI, the tokenless way: https://github.com/marketplace/actions/pypi-publish

  17. npq

    5 malicious-code-ruleset VS npq

    safely install npm packages by auditing them pre-install stage

  18. cicd-goat

    A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.

  19. maven-lockfile

    Lockfiles for Maven. Pin your dependencies. Build with integrity.

  20. faraday

    Open Source Vulnerability Management Platform (by infobyte)

  21. changed-files

    A patched clone tj-actions with the malicious commit reverted (by trmlabs)

  22. SaaSHub

    SaaSHub - Software Alternatives and Reviews. SaaSHub helps you find the best software and product alternatives

    SaaSHub logo
NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better malicious-code-ruleset alternative or higher similarity.

malicious-code-ruleset discussion

Log in or Post with

malicious-code-ruleset reviews and mentions

Posts with mentions or reviews of malicious-code-ruleset. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2025-03-14.
  • Popular GitHub Action tj-actions/changed-files is compromised
    35 projects | news.ycombinator.com | 14 Mar 2025
    We've recently released open-source tools that would have easily prevented this, before anything runs or added to any pipeline:

    1. The maintainers could have used PRevent to immediately alert and block any PR containing malicious code, or easily configured it for detection in case of a direct push: https://github.com/apiiro/PRevent

    2. Users could have used our malicious code detection ruleset to immediately detect and block it when scanning updates in all relevant CI/CD stages: https://github.com/apiiro/malicious-code-ruleset

    3. For a better understanding of the detection, the malicious code falls precisely into the patterns presented in our research: https://apiiro.com/blog/guard-your-codebase-practical-steps-...

  • Tj-actions/changed-files GitHub Action Compromised – used by over 23K repos
    15 projects | news.ycombinator.com | 14 Mar 2025
    https://github.com/apiiro/malicious-code-ruleset

    3. For a better understanding of the detection, the malicious code falls precisely into the patterns presented in our research:

  • I built a PR listener and a ruleset for detecting malicious code at any stage of the CI/CD
    2 projects | dev.to | 26 Feb 2025
    The ruleset: https://github.com/apiiro/malicious-code-ruleset
  • Show HN: I built a PR listener and ruleset to detect malicious code in CI/CD
    2 projects | news.ycombinator.com | 25 Feb 2025
    I built a GitHub app that detects it in pull requests, notifies or blocks them. Alongside it, I published a Semgrep ruleset for any stage of the CI/CD.

    I started this after getting frustrated by all the FUD around malicious code - lots of noise, little effort to solve it. Having said that, it's still a major attack vector - a stored RCE, with the codebase itself as the sink.

    Feedback is appreciated.

    The app, PRevent - https://github.com/apiiro/PRevent

    The ruleset: https://github.com/apiiro/malicious-code-ruleset

    The research: https://apiiro.com/blog/guard-your-codebase-practical-steps-...

  • A note from our sponsor - Stream
    getstream.io | 11 Jul 2025
    Stream helps developers build engaging apps that scale to millions with performant and flexible Chat, Feeds, Moderation, and Video APIs and SDKs powered by a global edge network and enterprise-grade infrastructure. Learn more →

Stats

Basic malicious-code-ruleset repo stats
4
122
7.8
5 months ago

Sponsored
InfluxDB – Built for High-Performance Time Series Workloads
InfluxDB 3 OSS is now GA. Transform, enrich, and act on time series data directly in the database. Automate critical tasks and eliminate the need to move data externally. Download now.
www.influxdata.com

Did you know that Python is
the 2nd most popular programming language
based on number of references?