Ci Demos

Examples of Docker image build pipelines, including vulnerability scanning with Anchore Engine
Alternatives To Ci Demos
Project NameStarsDownloadsRepos Using ThisPackages Using ThisMost Recent CommitTotal ReleasesLatest ReleaseOpen IssuesLicenseLanguage
Scancode.io88
3 months ago9October 25, 2023240apache-2.0Python
ScanCode.io is a server to script and automate software composition analysis pipelines with ScanPipe pipelines. This project is sponsored by NLnet project https://nlnet.nl/project/vulnerabilitydatabase/ Google Summer of Code, nexB and others generous sponsors!
Purify76
3 years ago6mitVue
All-in-one tool for managing vulnerability reports from AppSec pipelines
Advisor29
3 years agoMakefile
Alcide Kubernetes Advisor ... Cluster Hygiene & Security Scanner - Pipeline Integration
Pipeline22
4 years agoJavaScript
Alcide Kubernetes Advisor ... Cluster Hygiene & Security Scanner - Pipeline Integration
Npm Audit Pipeline122a year ago19December 30, 20214apache-2.0TypeScript
NPM Audit Tool for Pipelines
Golden Ami Pipeline With Qualys9
4 years ago1other
Create a Golden AMI Pipeline integrated with a Qualys Scanner for vulnerability assessments
Cve 2018 37608
5 years ago
Rails Asset Pipeline Directory Traversal Vulnerability
Snyk Tekton7
4 years agootherHTML
A set of Tekton Tasks for using Snyk to check for vulnerabilities in your pipelines
Golden Ami Pipeline With Tenable Sample6
2 years agomit-0
The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the box. This version of the pipeline integrates with Tenable.io for vulnerability assessments.
Azure Devops Demo6
4 years ago11mitJavaScript
Basic Node App built with Azure DevOps for demos
Alternatives To Ci Demos
Select To Compare


Alternative Project Comparisons
Popular Vulnerabilities Projects
Popular Pipeline Projects
Popular Security Categories

Get A Weekly Email With Trending Projects For These Categories
No Spam. Unsubscribe easily at any time.
Javascript
Pipeline
Scanner
Continuous Integration
Vulnerabilities
Build Pipelines