CI/CD security gate for detecting vulnerable dependencies (CVE/OSV) and preventing open-source supply chain attacks with policy-based build enforcement.
-
Updated
Feb 26, 2026 - Go
8000
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
CI/CD security gate for detecting vulnerable dependencies (CVE/OSV) and preventing open-source supply chain attacks with policy-based build enforcement.
Go vulnerability data aggregator with EU CRA compliance - 28 providers including EU-specific feeds (KEV, EUVD, BSI CERT-Bund, CERT-FR)
Go client library for the Vulners vulnerability database API — search, audit, SBOM, VScanner, and more
🔍 Scan vulnerabilities with a Go-based CLI tool using Vulners data for reliable JSON output, ideal for security teams and CI/CD pipelines.
LLM4CVE is a command line tool that use LLM to analyze and summarize Common Vulnerabilities and Exposures (CVEs). Given a CVE (or a list) the system generate a summary of their description.
JumpServer未授权访问漏洞(CVE-2023-42442)后利用
[MIRROR] self-hosted WAF to protect your websites from attacks and exploits
Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution.
VulDB Google Go code to fetch data via API
orchestrates the execution of reboots to ensure security and stability of your infrastructure
Local-first CycloneDX SBOM explorer that turns dependency and vulnerability data into an interactive graph with NVD enrichment.
Automatically protect your Kubernetes workloads against vulnerabilities with zero human intervention.
A Go security vulnerability research tool for searching the CVE Project repository for a particular keyword.
Analyze dependency behavior across 22 languages to detect risks like network access, execution, and unsafe operations beyond known vulnerabilities.
End-to-end solution for tracking image vulnerabilities over time using most popular open source scanners (e.g. grype, snyk, trivy).
Tool for scanning/finding open VNCs on the internet.