Join us

ContentUpdates and recent posts about OWASP Dependency-Check..
 Activity
@varbear added a new tool Bandit , 3 months, 2 weeks ago.
 Activity
@devopslinks added a new tool JFrog Xray , 3 months, 2 weeks ago.
 Activity
@devopslinks added a new tool OWASP Dependency-Check , 3 months, 2 weeks ago.
 Activity
@varbear added a new tool pre-commit , 3 months, 2 weeks ago.
 Activity
@devopslinks added a new tool GitGuardian , 3 months, 2 weeks ago.
 Activity
@devopslinks added a new tool detect-secrets , 3 months, 2 weeks ago.
 Activity
@devopslinks added a new tool Gitleaks , 3 months, 2 weeks ago.
Course
@eon01 published a course, 3 months, 2 weeks ago
Founder, FAUN.dev

DevSecOps in Practice

TruffleHog Flask NeuVector detect-secrets pre-commit OWASP Dependency-Check Docker checkov Bandit Hadolint Grype KubeLinter Syft GitLab CI/CD Trivy Kubernetes

A Hands-On Guide to Operationalizing DevSecOps at Scale

DevSecOps in Practice
Story
@tairascott shared a post, 3 months, 2 weeks ago
AI Expert and Consultant, Trigma

How Do Large Language Models (LLMs) Work? An In-Depth Look

Discover how Large Language Models work through a clear and human centered explanation. Learn about training, reasoning, and real world applications including Agentic AI development and LLM powered solutions from Trigma.

How do Large Language Models (LLMs) Work Banner
Story
@laura_garcia shared a post, 3 months, 2 weeks ago
Software Developer, RELIANOID

🔐 RELIANOID at Gartner IAM Summit 2025 | Dec 8–10, Grapevine, TX

We’re heading to the Gartner Identity & Access Management Summit to showcase how RELIANOID’s intelligent proxy and ADC platforms empower modern IAM: enhancing Zero Trust enforcement, adaptive access, and hybrid/multi-cloud security. Join us to explore AI-driven automation, ITDR, and identity governa..

Gartner Identity and Access Management Summit 2025 relianoid
OWASP Dependency-Check is an open source Software Composition Analysis (SCA) tool that scans application dependencies to detect publicly disclosed vulnerabilities. It analyzes project manifests, package metadata, and binary artifacts, then matches them against multiple vulnerability databases, including the NVD. Dependency-Check supports Java, JavaScript, .NET, Python, Ruby, and many other ecosystems. Teams integrate it into CI pipelines, IDEs, and build systems to catch vulnerable libraries early and maintain secure software supply chains. As part of the OWASP foundation, it is widely trusted for transparent, vendor-neutral security scanning.