Prevent merging of malicious code in pull requests
-
Updated
Feb 19, 2025 - Python
Prevent merging of malicious code in pull requests
Focused malicious code detection ruleset, with a high protection-to-noise ratio
Be careful not to infect yourself when accessing and experimenting with malicious software.
Demonstrates how a malicious dependency could negatively impact the build output.
Analyze and Detect broken and malicious JS/TS modules.
Malware
The growing integration of intelligent gadgets and the World Wide Web has underscored the significance of Internet of Things (IoT) technologies in our everyday existence. These technologies play a crucial role in supporting manufacturing enterprises by providing real-time supervision of machinery statuses, product excellence, and environmental fact
Maleware Classification from their signature
Hackers attacks intercepted
Fake metasploit framework installer (written in C) that kills linux system with shell rm command when it gains root privileges.
Add a description, image, and links to the malicious-code topic page so that developers can more easily learn about it.
To associate your repository with the malicious-code topic, visit your repo's landing page and select "manage topics."