A general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities.
Tsunami is a general purpose network security scanner developed by Google that detects high severity vulnerabilities in networked systems with high confidence. It uses an extensible plugin system to provide core scanning capabilities, allowing security teams to identify critical security risks across their infrastructure. The scanner is designed to minimize false positives by focusing on high-confidence detections for serious vulnerabilities.
Security engineers, penetration testers, and DevOps teams responsible for securing network infrastructure and performing vulnerability assessments. It is particularly suited for organizations needing a scalable, plugin-based scanner for internal security audits.
Developers choose Tsunami for its extensible plugin architecture, which allows for custom detection modules and community-driven expansions. Its focus on high-confidence, high-severity vulnerability detection reduces noise and prioritizes critical risks, making it a reliable tool for enterprise security assessments.
Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
Core scanning capabilities are modular and expandable via plugins hosted in a separate repository, enabling community-driven enhancements and customization for specific environments.
Focuses on identifying high-severity vulnerabilities to minimize false positives, prioritizing critical risks for reliable security assessments.
Designed as a general-purpose scanner that can be integrated into DevOps pipelines, allowing for scalable and automated security checks across networked systems.
Built and maintained as an open-source project, it encourages community contributions and provides transparency in scanning logic, fostering trust and collaboration.
Plugins are maintained in a separate repository, which can lead to inconsistencies, require manual updates, and limit out-of-the-box detection coverage without custom development.
Requires building from source with dependencies like Java and Maven, and configuring plugins separately, making initial deployment non-trivial for teams without security expertise.
Disclaimer states it's not an official Google product, which may result in slower updates, less enterprise support, and reliance on community for troubleshooting.
Find secrets with Gitleaks 🔑
Dockerfile linter, validate inline bash, written in Haskell
A vulnerability scanner for container images and filesystems
Vulnerability Static Analysis for Containers
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.