Prevent merging of malicious code in pull requests
-
Updated
Feb 19, 2025 - Python
Prevent merging of malicious code in pull requests
Focused malicious code detection optimizing the protection-to-noise ratio
Be careful not to infect yourself when accessing and experimenting with malicious software.
Demonstrates how a malicious dependency could negatively impact the build output.
Analyze and Detect broken and malicious JS/TS modules.
Malware
Maleware Classification from their signature
The growing integration of intelligent gadgets and the World Wide Web has underscored the significance of Internet of Things (IoT) technologies in our everyday existence. These technologies play a crucial role in supporting manufacturing enterprises by providing real-time supervision of machinery statuses, product excellence, and environmental fact
Fake metasploit framework installer (written in C) that kills linux system with shell rm command when it gains root privileges.
Hackers attacks intercepted
Add a description, image, and links to the malicious-code topic page so that developers can more easily learn about it.
To associate your repository with the malicious-code topic, visit your repo's landing page and select "manage topics."