Technologies Overview
- AI Agent SandboxingSecurity Practices & FrameworksAdopt
- CheckmarxAI Security ScanningAssess
- Cloud Secret Managers (AWS / Azure / GCP)Secret Detection & ManagementAdopt
- CodeQLAI Security ScanningAdopt
- CodeRabbitAI Security ScanningTrial
- DependabotSupply Chain SecurityAdopt
- Docker MCP GatewaySecret Detection & ManagementAssess
- EU AI ActSecurity Practices & FrameworksAssess
- GitGuardianSecret Detection & ManagementAdopt
- GitHub Copilot Security ReviewAI Security ScanningAssess
- GitHub Secret Scanning & Push ProtectionSecret Detection & ManagementAdopt
- Gitleaks / BetterleaksSecret Detection & ManagementTrial
- HashiCorp VaultSecret Detection & ManagementTrial
- Lakera Guard (Check Point)Security Practices & FrameworksTrial
- MCP Security Best PracticesSecurity Practices & FrameworksTrial
- NIST AI Risk Management FrameworkSecurity Practices & FrameworksAssess
- NVIDIA NeMo GuardrailsSecurity Practices & FrameworksAssess
- OpenSSF ScorecardSupply Chain SecurityTrial
- OSV.devSupply Chain SecurityTrial
- OWASP Top 10 (Classic, 2025 Edition)Security Practices & FrameworksAdopt
- OWASP Top 10 for LLM ApplicationsSecurity Practices & FrameworksAdopt
- Pre-Commit Security HooksSecurity Practices & FrameworksAdopt
- Prompt Injection PreventionSecurity Practices & FrameworksAssess
- RenovateSupply Chain SecurityAdopt
- Security MCP Servers EcosystemAI Security ScanningAssess
- SemgrepAI Security ScanningAdopt
- Sigstore / CosignSupply Chain SecurityTrial
- SLSA FrameworkSupply Chain SecurityAssess
- Snyk CodeAI Security ScanningTrial
- Socket.devSupply Chain SecurityAdopt
- SonarQubeAI Security ScanningAdopt
- Syft / GrypeSupply Chain SecurityTrial
- Threat Modeling for AI SystemsSecurity Practices & FrameworksTrial
- TrivyAI Security ScanningTrial
- TruffleHogSecret Detection & ManagementAdopt