Showing 3 open source projects for "accessible-coconut"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • AI-generated apps that pass security review Icon
    AI-generated apps that pass security review

    Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.

    Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
    Try Retool free
  • 1
    Blaiz Tools

    Blaiz Tools

    Tools for working with Gossamer codebase and app source code

    Tools for packing files, converting images, manipulating text, checking code and working with the Gossamer codebase and app source code.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Sanity4J simplifies running multiple code analysis tools on Java projects on an ad-hoc basis. It provides a single entry point to run the tools and produces a consolidated report, which presents all findings in an easily accessible format. Homepage: https://sanity4j.github.io/ Project page: https://github.com/Sanity4J/Sanity4J/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    ...More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis. Type checking is used for finding bugs on the way integers are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. After this two analyses, the tool correlates the results from the previous phases to attain if the data that comes from the inputs are affected by vulnerabilities from porting to LP64, and if these are handled by dangerous functions (memcpy, strcpy,...). In resume, identify if the found bugs
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB