Prevent merging of malicious code in pull requests
-
Updated
Mar 20, 2025 - Python
Prevent merging of malicious code in pull requests
Focused malicious code detection ruleset, with a high protection-to-noise ratio
Be careful not to infect yourself when accessing and experimenting with malicious software.
Demonstrates how a malicious dependency could negatively impact the build output.
Analyze and Detect broken and malicious JS/TS modules.
Malware
Maleware Classification from their signature
Fake metasploit framework installer (written in C) that kills linux system with shell rm command when it gains root privileges.
Hackers attacks intercepted
The growing integration of intelligent gadgets and the World Wide Web has underscored the significance of Internet of Things (IoT) technologies in our everyday existence. These technologies play a crucial role in supporting manufacturing enterprises by providing real-time supervision of machinery statuses, product excellence, and environmental fact
Add a description, image, and links to the malicious-code topic page so that developers can more easily learn about it.
To associate your repository with the malicious-code topic, visit your repo's landing page and select "manage topics."