pre-commit-hooks-safety - A pre-commit hook to check your Python dependencies against safety-db

  •        161

A pre-commit hook to check your Python dependencies against safety-db. It checks all files containing requirements in their name in the repo.

https://github.com/Lucas-C/pre-commit-hooks-safety

Tags
Implementation
License
Platform

   




Related Projects

pre-commit - Automatically installs a git pre-commit script in your git repository which runs your `npm test` on pre-commit

  •    Javascript

pre-commit is a pre-commit hook installer for git. It will ensure that your npm test (or other specified scripts) passes before you can commit your changes. This all conveniently configured in your package.json. But don't worry, you can still force a commit by telling git to skip the pre-commit hooks by simply committing using --no-verify.

pre-commit-hooks - Some out-of-the-box hooks for pre-commit

  •    Python

Some out-of-the-box hooks for pre-commit. If you'd like to use these hooks, they're also available as a standalone package.

puppet-git-hooks - Git client and server side hooks for puppet development

  •    Shell

Git hooks to assist puppet module development. Client side hooks allow for various checks before commits are staged. Server side hooks are provided for infrastructural reinforcement of various standardization compliances. In your git repository you can symlink the pre-commit file from this repository to the .git/hooks/pre-commit of your repository you want to implement this feature.

pre-commit - A framework for managing and maintaining multi-language pre-commit hooks.

  •    Python

A framework for managing and maintaining multi-language pre-commit hooks.

husky - :dog: Git hooks made easy

  •    Javascript

By default, husky expects your project's package.json and your .git directory to be at the same level. It can be configured to support monorepos or sub-directories.Check documentation for more.


financial-demo - A demo for a financial services bot

  •    Python

This is an example chatbot demonstrating how to build AI assistants for financial services and banking. This starter pack can be used as a base for your own development or as a reference guide for implementing common banking-industry features with Rasa. It includes pre-built intents, actions, and stories for handling conversation flows like checking spending history and transferring money to another account. With pre-commit installed, the black and doctoc hooks will run on every git commit. If any changes are made by the hooks, you will need to re-add changed files and re-commit your changes.

fit-commit - A Git hook to validate your commit messages based on community standards.

  •    Ruby

A Git hook to validate your commit messages based on community standards. This creates a .git/hooks/commit-msg script which will automatically check your Git commit messages.

scanner-cli - A project security/vulnerability/risk scanning tool

  •    Javascript

The Hawkeye scanner-cli is a project security, vulnerability and general risk highlighting tool. It is meant to be integrated into your pre-commit hooks and your pipelines. This is not exhaustive as sometimes tools require further files to exist. To understand how the modules decide whether they can handle a project, please check the How it works section and the modules folder.

cz-cli - The commitizen command line utility.

  •    Javascript

When you commit with Commitizen, you'll be prompted to fill out any required commit fields at commit time. No more waiting until later for a git commit hook to run and reject your commit (though that can still be helpful). No more digging through CONTRIBUTING.md to find what the preferred format is. Get instant feedback on your commit message formatting and be prompted for required fields. Now, simply use git cz instead of git commit when committing.

git-confirm - :question: Git hook to catch placeholders and temporary changes (TODO / @ignore) before you commit them

  •    Shell

Git hook to catch placeholders and temporary changes (TODO / @ignore) before you commit them. If you're security conscious, you may be reasonably suspicious of curling executable files. Here you're on HTTPS throughout though, and you're not piping directly to execution so you can check contents and the hash (against MD5 04baf1f87974681a92ee7fe8c0aa3aaa for v0.2.1) before using this, if you like.

safe-commit-hook - pre-commit hook for Git that checks for suspicious files.

  •    Python

This is a git pre-commit hook that is inspired by the Gitrob project. They are currently in JSON format at ~/.safe-commit-hook/git-deny-patterns.json.

pre-commit - A slightly improved pre-commit hook for git

  •    Javascript

A slightly improved pre-commit hook for git

nbstripout - strip output from Jupyter and IPython notebooks

  •    Python

Opens a notebook, strips its output, and writes the outputless version to the original file. Useful mainly as a git filter or pre-commit hook for users who don't want to track output in VCS.

precommit-hook - An npm installable git pre-commit hook used to lint and test your code

  •    Javascript

This module is a handy little tool that I wrote to help enforce code quality in Node.js projects. It allows you to run any scripts defined in your package.json before a commit is made. Version 2.0.0 of this module (and the current master branch in this repository) has been updated to use git-validate, as such the configuration key in package.json will be changed to "pre-commit" with a dash, instead of the old "precommit". All other functionality should work the same.

captainhook - Very flexible git hook manager for php developers

  •    PHP

CaptainHook is an easy to use and very flexible git hook library for php developers. It enables you to configure your git hook actions in a simple json file. You can use CaptainHook to validate or prepare your commit messages, ensure code quality or run unit tests before you commit or push changes to git. You can automatically clear local caches or install the latest composer dependencies after pulling the latest changes.

dploy - An FTP/SFTP deployment tool built in node.js.

  •    CoffeeScript

DPLOY is an FTP/SFTP deployment tool built in node.js Uploads the latest changes by comparing the version on your server with your git repository. Will install the dploy.yaml file and set up a post-commit script on your .git/hooks folder so you can DPLOY from your commit message as well.

grumphp - A PHP code-quality tool

  •    PHP

Sick and tired of defending code quality over and over again? GrumPHP will do it for you! This composer plugin will register some git hooks in your package repository. When somebody commits changes, GrumPHP will run some tests on the committed code. If the tests fail, you won't be able to commit your changes. This handy tool will not only improve your codebase, it will also teach your co-workers to write better code following the best practices you've determined as a team. GrumPHP has a set of common tasks built-in. You will be able to use GrumPHP with a minimum of configuration.

pie - 🍕 Enjoy a slice! A utility library for dealing with slices and maps that focuses on type safety and performance

  •    Go

Enjoy a slice! pie is a code generator for dealing with slices that focuses on type safety, performance and immutability. Run go generate. This will create a file called cars_pie.go. You should commit this with the rest of your code. Run go generate any time you need to add more types.

Cruise Control .NET Pre-Tested Commit Extension

  •    

In this project i am going to extend cruise control with pre-tested commit feature. This extension protects the code base from incorrect code. All code modification are submitted into version control ONLY if all defined requirements are met.

gitlab-shell - Replacement for gitolite

  •    Ruby

GitLab Shell handles git commands for GitLab and modifies the list of authorized keys. GitLab Shell is not a Unix shell nor a replacement for Bash or Zsh. Maybe you wonder why in the case of git push over http(s) the Rails app doesn't handle authentication before delegating to GitLab Shell. This is because GitLab Rails doesn't have the logic to interpret git push commands. The idea is to have these interpretation code in only one place and this is GitLab Shell so we can reuse it for ssh access. Actually GitLab Shell executes all git push commands without checking authorizations and relies on the pre-receive hooks to check authorizations. When you do a git pull command the authorizations are checked before executing the commands (either in GitLab Rails or GitLab Shell with an API call to GitLab Rails). The authorization checks for git pull are much simpler since you only have to check if a user can access the repo (no need to check branch permissions).






We have large collection of open source products. Follow the tags from Tag Cloud >>


Open source products are scattered around the web. Please provide information about the open source projects you own / you use. Add Projects.