From 1de1f58001605cab920dc19e49f7757bc3b35e05 Mon Sep 17 00:00:00 2001 From: vexlit Date: Sat, 28 Mar 2026 22:01:09 +0900 Subject: [PATCH 1/2] Add VEXLIT - AST-based SAST with taint analysis --- data/tools/vexlit.yml | 29 +++++++++++++++++++++++++++++ 1 file changed, 29 insertions(+) create mode 100644 data/tools/vexlit.yml diff --git a/data/tools/vexlit.yml b/data/tools/vexlit.yml new file mode 100644 index 0000000000..ebc36b30d6 --- /dev/null +++ b/data/tools/vexlit.yml @@ -0,0 +1,29 @@ +name: VEXLIT +categories: + - linter +tags: + - c + - csharp + - dart + - go + - java + - javascript + - kotlin + - php + - python + - ruby + - rust + - scala + - security + - swift + - typescript +license: MIT +types: + - cli +source: 'https://github.com/vexlit/cli' +homepage: 'https://vexlit.ai' +description: >- + AST-based static analysis with taint tracking across 34 languages. + Tracks how data flows across functions instead of pattern matching, + detecting real vulnerabilities with low false positive rate. + Zero-config CLI with SARIF output for CI/CD integration. From 9db72c7b5e1a7cbacca3a98d8e55eed7bbec639b Mon Sep 17 00:00:00 2001 From: Analysis Tools Bot Date: Mon, 13 Apr 2026 22:28:11 +0000 Subject: [PATCH 2/2] Commit list --- README.md | 8 +++++--- data/api/tools.json | 46 +++++++++++++++++++++++++++++++++++++++++++-- 2 files changed, 49 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 4bc7bd1a86..e1a7a82690 100644 --- a/README.md +++ b/README.md @@ -885,7 +885,7 @@ A ktfmt IntelliJ plugin is available from the plugin repository. To install it, - [phpDocumentor](https://www.phpdoc.org) — Analyzes PHP source code to generate documentation. -- [phploc](https://github.com/sebastianbergmann/phploc) — A tool for quickly measuring the size and analyzing the structure of a PHP project. +- **phploc** :warning: — A tool for quickly measuring the size and analyzing the structure of a PHP project. - [PHPMD](https://phpmd.org) — Finds possible bugs in your code. @@ -1685,6 +1685,8 @@ orchestration to ensure zero breaking changes. Specialized for React, Next.js, a - [Veracode](https://www.veracode.com/security/static-code-analysis) :copyright: — Find flaws in binaries and bytecode without requiring source. Support all major programming languages: Java, .NET, JavaScript, Swift, Objective-C, C, C++ and more. +- [VEXLIT](https://vexlit.ai) — AST-based static analysis with taint tracking across 34 languages. Tracks how data flows across functions instead of pattern matching, detecting real vulnerabilities with low false positive rate. Zero-config CLI with SARIF output for CI/CD integration. + - [WALA](https://github.com/wala/WALA) — Static analysis capabilities for Java bytecode and related languages and for JavaScript. - [weggli](https://github.com/googleprojectzero/weggli) — A fast and robust semantic search tool for C and C++ codebases. It is designed to help security researchers identify interesting functionality in large codebases. @@ -2068,7 +2070,7 @@ Its technology helps developers automate testing, find bugs, and reduce manual l - [krane](https://github.com/appvia/krane) — Krane is a simple Kubernetes RBAC static analysis tool. It identifies potential security risks in K8s RBAC design and makes suggestions on how to mitigate them. Krane dashboard presents current RBAC security posture and lets you navigate through its definition. -- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters. +- **kube-hunter** :warning: — Hunt for security weaknesses in Kubernetes clusters. - [kube-lint](https://github.com/viglesiasce/kube-lint) — A linter for Kubernetes resources with a customizable rule set. You define a list of rules that you would like to validate against your resources and kube-lint will evaluate those rules against them. @@ -2313,7 +2315,7 @@ Kani verifies: - [kics](https://kics.io/) — Find security vulnerabilities, compliance issues, and infrastructure misconfigurations in your infrastructure-as-code. Supports Terraform, Kubernetes, Docker, AWS CloudFormation and Ansible -- [kube-hunter](https://aquasecurity.github.io/kube-hunter/) — Hunt for security weaknesses in Kubernetes clusters. +- **kube-hunter** :warning: — Hunt for security weaknesses in Kubernetes clusters. - [lockfile-lint](https://github.com/lirantal/lockfile-lint) — Lint an npm or yarn lockfile to analyze and detect security issues diff --git a/data/api/tools.json b/data/api/tools.json index af1ff65397..3ac0d8a14b 100644 --- a/data/api/tools.json +++ b/data/api/tools.json @@ -11001,7 +11001,7 @@ "plans": null, "description": "Hunt for security weaknesses in Kubernetes clusters.", "discussion": null, - "deprecated": null, + "deprecated": true, "resources": null, "reviews": null, "demos": null, @@ -14616,7 +14616,7 @@ "plans": null, "description": "A tool for quickly measuring the size and analyzing the structure of a PHP project.", "discussion": null, - "deprecated": null, + "deprecated": true, "resources": null, "reviews": null, "demos": null, @@ -22000,6 +22000,48 @@ "demos": null, "wrapper": null }, + "vexlit": { + "name": "VEXLIT", + "categories": [ + "linter" + ], + "languages": [ + "c", + "csharp", + "dart", + "go", + "java", + "javascript", + "kotlin", + "php", + "python", + "ruby", + "rust", + "scala", + "swift", + "typescript" + ], + "other": [ + "security" + ], + "licenses": [ + "MIT" + ], + "types": [ + "cli" + ], + "homepage": "https://vexlit.ai", + "source": "https://github.com/vexlit/cli", + "pricing": null, + "plans": null, + "description": "AST-based static analysis with taint tracking across 34 languages. Tracks how data flows across functions instead of pattern matching, detecting real vulnerabilities with low false positive rate. Zero-config CLI with SARIF output for CI/CD integration.", + "discussion": null, + "deprecated": null, + "resources": null, + "reviews": null, + "demos": null, + "wrapper": null + }, "vint": { "name": "vint", "categories": [