A static application security testing (SAST) tool that scans source code to discover, filter, and prioritize security and privacy risks.
Bearer is a static application security testing (SAST) tool that scans source code to identify security vulnerabilities and privacy risks. It analyzes data flows to detect issues like injection flaws, sensitive data exposure, and misconfigurations, prioritizing findings based on their potential impact. The tool supports multiple programming languages and integrates into development workflows to provide early feedback.
Development and security teams building applications in supported languages (Go, Java, JavaScript, TypeScript, PHP, Python, Ruby) who need automated security and privacy scanning within their CI/CD pipelines.
Bearer reduces alert fatigue by prioritizing risks related to sensitive data exposure, offers both security and privacy scanning in one tool, and provides a developer-friendly experience with fast scans and clear, actionable reports.
Code security scanning tool (SAST) to discover, filter and prioritize security and privacy risks.
Prioritizes findings based on sensitive data exposure like PII and PHI, reducing alert fatigue by focusing on critical OWASP and CWE vulnerabilities first.
Covers seven popular languages including Go, Java, and Python in the open-source version, making it suitable for diverse web application stacks.
Generates automated reports for GDPR compliance (e.g., DPIA, RoPA) by detecting over 120 sensitive data types and components processing data.
Offers fast scans, clear output with progress bars, and easy CI/CD setup via Docker or install scripts, as shown in the getting started guide.
Cross-file and interprocedural analysis—key for accurate vulnerability detection—are only fully available in Bearer Pro for limited languages like Java and Python.
The free version lacks support for languages like C#, Kotlin, and Elixir, which are reserved for the commercial offering, forcing upgrades for multi-language teams.
As admitted in the FAQs, false positives are possible despite modern techniques, requiring manual triage and potentially slowing down development workflows.
Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.
Tfsec is now part of Trivy
Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastructure-as-code with KICS by Checkmarx.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.