{"id":48914953,"url":"https://github.com/filipi86/drogonsec","last_synced_at":"2026-04-17T01:32:16.670Z","repository":{"id":349535747,"uuid":"1166539042","full_name":"filipi86/drogonsec","owner":"filipi86","description":"High-performance open-source security scanner combining SAST, SCA, Secret Detection, and IaC analysis, built for developers and CI/CD pipelines.","archived":false,"fork":false,"pushed_at":"2026-04-13T12:58:48.000Z","size":311,"stargazers_count":39,"open_issues_count":3,"forks_count":12,"subscribers_count":0,"default_branch":"main","last_synced_at":"2026-04-13T13:31:41.336Z","etag":null,"topics":["application-security","cicd-security","cloud-security","code-scanning","dependency-scanning","devsecops","iac-security","open-source-security","sast","sca","secret-detection","security-scanner","shift-left-security","static-analysis","vulnerability-scanner"],"latest_commit_sha":null,"homepage":"","language":"Go","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/filipi86.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":"CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null}},"created_at":"2026-02-25T10:31:12.000Z","updated_at":"2026-04-13T12:58:40.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/filipi86/drogonsec","commit_stats":null,"previous_names":["filipi86/drogonsec"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/filipi86/drogonsec","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/filipi86%2Fdrogonsec","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/filipi86%2Fdrogonsec/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/filipi86%2Fdrogonsec/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/filipi86%2Fdrogonsec/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/filipi86","download_url":"https://codeload.github.com/filipi86/drogonsec/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/filipi86%2Fdrogonsec/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":31911478,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-16T18:22:33.417Z","status":"ssl_error","status_checked_at":"2026-04-16T18:21:47.142Z","response_time":69,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["application-security","cicd-security","cloud-security","code-scanning","dependency-scanning","devsecops","iac-security","open-source-security","sast","sca","secret-detection","security-scanner","shift-left-security","static-analysis","vulnerability-scanner"],"created_at":"2026-04-17T01:32:15.786Z","updated_at":"2026-04-17T01:32:16.651Z","avatar_url":"https://github.com/filipi86.png","language":"Go","readme":"\u003cdiv align=\"center\"\u003e\n\n# 🛡️ Drogonsec Security Scanner\n\n[![CI/CD](https://github.com/filipi86/drogonsec/actions/workflows/ci.yml/badge.svg)](https://github.com/filipi86/drogonsec/actions)\n[![License](https://img.shields.io/badge/License-Apache%202.0-blue.svg)](LICENSE)\n[![OWASP Top 10 2025](https://img.shields.io/badge/OWASP-Top%2010%3A2025-orange.svg)](https://owasp.org/Top10/2025/)\n[![Go 1.25+](https://img.shields.io/badge/Go-1.25+-00ADD8.svg)](https://golang.org)\n[![GitHub Release](https://img.shields.io/github/v/release/filipi86/drogonsec)](https://github.com/filipi86/drogonsec/releases)\n[![GitHub Issues](https://img.shields.io/github/issues/filipi86/drogonsec)](https://github.com/filipi86/drogonsec/issues)\n\n\u003c/div\u003e\n\n\u003cimg width=\"1099\" height=\"404\" alt=\"image\" src=\"https://github.com/user-attachments/assets/500be7b6-98ca-43b1-a580-fba6bf32adde\" /\u003e\n\n\u003e An open-source, comprehensive security scanner combining SAST, SCA, and secret detection aligned with OWASP Top 10:2025 — created for intelligent remediation.\n\n---\n\n## Documentation\n\n📖 **Full Documentation:** --\u003e  [Drogonsec Doc](https://cross-intel.com/opensource/drogonsec)\n\n---\n\n## Features\n\n| Engine | Description |\n|--------|-------------|\n| **SAST** | Static Application Security Testing for 20+ languages |\n| **SCA**  | Software Composition Analysis — scan dependencies for CVEs |\n| **Leaks** | Secret detection — 50+ patterns (AWS, GCP, GitHub, JWT, SSH keys...) |\n| **IaC**  | Infrastructure as Code misconfigurations (Terraform, Kubernetes) |\n| **AI**   | AI-powered remediation — Ollama (local/free) or cloud providers |\n\n### Security Frameworks\n- **OWASP Top 10:2025** — All 10 categories covered (including 2 new: Supply Chain \u0026 Mishandling Exceptions)\n- **CWE** — Common Weakness Enumeration mapping\n- **CVSS 3.1** — Severity scoring\n- **SARIF 2.1** — GitHub/Azure DevOps integration\n\n### Supported Languages\n`Python` `Java` `JavaScript` `TypeScript` `Go` `Kotlin` `C#` `PHP` `Ruby` `Swift` `Dart` `Elixir` `Erlang` `Shell` `C/C++` `HTML` `Terraform` `Kubernetes` `Nginx`\n\n---\n\n## Quick Start\n\n### Installation\n\n**Go Install (requires Go 1.25+):**\n```bash\ngo install github.com/filipi86/drogonsec/cmd/drogonsec@latest\n```\n\n**From source:**\n```bash\ngit clone https://github.com/filipi86/drogonsec\ncd drogonsec\nmake install\n```\n\n**Docker:**\n```bash\ndocker run --rm -v $(pwd):/scan ghcr.io/filipi86/drogonsec scan /scan\n```\n\n### Basic Usage\n\n```bash\n# Scan current directory\ndrogonsec scan .\n\n# Scan with JSON output\ndrogonsec scan ./myproject --format json --output report.json\n\n# Scan with HTML report\ndrogonsec scan . --format html --output report.html\n\n# Scan with AI remediation (local Ollama — free, no API key needed)\ndrogonsec scan . --enable-ai\n\n# Scan with AI remediation (cloud provider — requires API key)\nAI_API_KEY=\"...\" drogonsec scan . --enable-ai --ai-provider anthropic\n\n# Scan git history for secrets\ndrogonsec scan . --git-history\n\n# Only report HIGH and CRITICAL\ndrogonsec scan . --severity HIGH\n\n# Disable specific engines\ndrogonsec scan . --no-sca\ndrogonsec scan . --no-leaks\ndrogonsec scan . --no-sast\n```\n\n---\n\n## Output Formats\n\n### Text (default)\n```\nDrogonsec Security Scanner\n═══════════════════════════════════════════\n  Target : /path/to/project\n  SAST   : enabled\n  SCA    : enabled\n  Leaks  : enabled\n═══════════════════════════════════════════\n\n═══ SAST FINDINGS ══════════════════════\n  #1 [HIGH] SQL Injection via string formatting\n  File     : src/users.py:42\n  Rule     : PY-001\n  OWASP    : A05:2025 - Injection\n  CWE      : CWE-89  CVSS: 9.8\n  Fix      : Use parameterized queries...\n```\n\n### JSON\n```json\n{\n  \"version\": \"0.1.0\",\n  \"stats\": { \"total_findings\": 5, \"critical\": 1, \"high\": 3 },\n  \"sast_findings\": [ ... ],\n  \"sca_findings\": [ ... ],\n  \"leak_findings\": [ ... ]\n}\n```\n\n### SARIF (GitHub Security Integration)\n```yaml\n# .github/workflows/security.yml\n- name: DragonSec Scan\n  run: drogonsec scan . --format sarif --output results.sarif\n  \n- name: Upload to GitHub Security\n  uses: github/codeql-action/upload-sarif@v4\n  with:\n    sarif_file: results.sarif\n```\n\n---\n\n## Configuration\n\nCreate `.drogonsec.yaml` in your project root:\n\n```yaml\nscan:\n  min_severity: LOW\n  workers: 4\n  git_history: false\n  ignore_paths:\n    - node_modules\n    - vendor\n    - dist\n\nengines:\n  sast:\n    enabled: true\n  sca:\n    enabled: true\n  leaks:\n    enabled: true\n    min_entropy: 3.5\n\nai:\n  enabled: false\n  high_severity_only: true\n\nfail_on:\n  critical: true\n  high: true\n```\n\n---\n\n## AI-Powered Remediation\n\nDrogonSec includes AI-powered remediation, providing intelligent, context-aware fixes for detected vulnerabilities. **Ollama + DeepSeek Coder** is the recommended open-source option — **Ollama is open-source (MIT license)** and runs 100% locally with no data leaving your machine.\n\n### Local AI (Ollama) — Recommended for OSS\n\n```bash\n# 1. Install Ollama (https://ollama.com)\n# macOS: brew install ollama\n\n# 2. Pull the recommended model\nollama pull deepseek-coder\n\n# 3. Scan with AI (auto-detects local Ollama)\ndrogonsec scan . --enable-ai\n\n# Use a different model\ndrogonsec scan . --enable-ai --ai-provider ollama --ai-model codellama\n```\n\n### Cloud AI (API Key Required)\n\n```bash\n# Anthropic\nAI_API_KEY=\"sk-ant-...\" drogonsec scan . --enable-ai --ai-provider anthropic\n\n# OpenAI-compatible\nAI_API_KEY=\"sk-...\" drogonsec scan . --enable-ai \\\n  --ai-provider openai \\\n  --ai-model gpt-4o\n\n# Custom endpoint\nAI_API_KEY=\"...\" drogonsec scan . --enable-ai \\\n  --ai-provider custom \\\n  --ai-endpoint https://your-endpoint/v1/messages\n\n# Example output:\n# 🤖 AI Remediation:\n# The SQL injection in line 42 allows attackers to manipulate your query...\n# Corrected code:\n#   cursor.execute(\"SELECT * FROM users WHERE id = %s\", (user_id,))\n```\n\n### Bring Your Own AI\n\nAny OpenAI-compatible endpoint works as a custom provider:\n\n```bash\nAI_API_KEY=\"your-key\" drogonsec scan . --enable-ai \\\n  --ai-provider custom \\\n  --ai-endpoint https://your-api/v1/messages\n```\n\n---\n\n## Shell Completion\n\nDrogonsec supports tab-completion for bash, zsh, fish, and PowerShell. See the [Usage docs](https://cross-intel.com/opensource/drogonsec/usage) for details.\n\n```bash\n# Bash\nsource \u003c(drogonsec completion bash)\n\n# Zsh\nsource \u003c(drogonsec completion zsh)\n```\n\n---\n\n## OWASP Top 10:2025 Coverage\n\n| # | Category | Status |\n|---|----------|--------|\n| A01 | Broken Access Control | ✅ 23 rules |\n| A02 | Security Misconfiguration | ✅ 31 rules |\n| A03 | Software Supply Chain Failures 🆕 | ✅ SCA Engine |\n| A04 | Cryptographic Failures | ✅ 18 rules |\n| A05 | Injection | ✅ 45 rules |\n| A06 | Insecure Design | ✅ 15 rules |\n| A07 | Authentication Failures | ✅ 20 rules |\n| A08 | Software or Data Integrity Failures | ✅ 9 rules |\n| A09 | Security Logging \u0026 Alerting Failures | ✅ 11 rules |\n| A10 | Mishandling of Exceptional Conditions 🆕 | ✅ 8 rules |\n\n---\n\n## Secret Detection Patterns\n\nDrogonsec detects 50+ secret patterns including:\n\n- **Cloud:** AWS Access Keys, GCP API Keys, Azure Storage Keys\n- **SCM:** GitHub tokens (classic, fine-grained, OAuth, App)\n- **Payment:** Stripe Secret/Restricted Keys\n- **Communication:** Slack Bot/App tokens, Webhook URLs\n- **Email:** SendGrid API Keys\n- **Crypto:** RSA/EC/SSH/PGP private keys, JWT tokens\n- **DB:** Connection strings (PostgreSQL, MySQL, MongoDB, Redis)\n- **Generic:** Hardcoded passwords, API keys, secrets\n\n---\n\n## Architecture\n\n```\ndrogonsec/\n├── cmd/drogonsec/          # CLI entrypoint\n├── internal/\n│   ├── analyzer/       # Main orchestrator\n│   ├── engine/         # SAST rules engine (20+ languages)\n│   ├── leaks/          # Secret detection engine\n│   ├── sca/            # Dependency analysis engine\n│   ├── reporter/       # Text/JSON/SARIF/HTML reporters\n│   ├── ai/             # AI remediation engine (Ollama + Cloud)\n│   └── config/         # Types and configuration\n└── rules/              # YAML rule definitions (community-extensible)\n```\n\n---\n\n## Contributing\n\nContributions are welcome! Areas to contribute:\n- New security rules for any language\n- Additional secret patterns  \n- Parser improvements\n- Documentation\n- Bug fixes\n\nSee [CONTRIBUTING](CONTRIBUTING.md) for guidelines.\n\n---\n\n## License\n\nApache License 2.0 — See [LICENSE](LICENSE)\n\n---\n\n## Credits\n\nInspired by Horusec. DrogonSec is its modern, actively maintained, and updated with enhanced capabilities.\n\nBuilt with: Go, Cobra, Viper, go-git.\n\n---\n\n## Maintained by\n\nThis open-source project is maintained and supported by **[CROSS-INTEL](https://cross-intel.com)**.\n\n---\n\n## Links\n\n📖 **Documentation:** [cross-intel.com/opensource/drogonsec](https://cross-intel.com/opensource/drogonsec)\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ffilipi86%2Fdrogonsec","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Ffilipi86%2Fdrogonsec","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Ffilipi86%2Fdrogonsec/lists"}