Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Cybersecurity Blue Team
  3. Tsunami Security Scanner

Tsunami Security Scanner

Apache-2.0Javav0.2.0

A general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities.

GitHubGitHub
8.6k stars920 forks0 contributors

What is Tsunami Security Scanner?

Tsunami is a general purpose network security scanner developed by Google that detects high severity vulnerabilities in networked systems with high confidence. It uses an extensible plugin system to provide core scanning capabilities, allowing security teams to identify critical security risks across their infrastructure. The scanner is designed to minimize false positives by focusing on high-confidence detections for serious vulnerabilities.

Target Audience

Security engineers, penetration testers, and DevOps teams responsible for securing network infrastructure and performing vulnerability assessments. It is particularly suited for organizations needing a scalable, plugin-based scanner for internal security audits.

Value Proposition

Developers choose Tsunami for its extensible plugin architecture, which allows for custom detection modules and community-driven expansions. Its focus on high-confidence, high-severity vulnerability detection reduces noise and prioritizes critical risks, making it a reliable tool for enterprise security assessments.

Overview

Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.

Use Cases

Best For

  • Performing internal network vulnerability assessments
  • Detecting high-severity security flaws in networked services
  • Building custom security scanning plugins for specific environments
  • Conducting security audits with minimal false positives
  • Integrating vulnerability scanning into DevOps pipelines
  • Educational purposes for learning about network security scanning

Not Ideal For

  • Organizations seeking a fully managed, cloud-based vulnerability scanning service with minimal setup
  • Teams needing compliance reporting for specific regulations like PCI DSS without custom plugin development
  • Small-scale projects or individuals looking for a lightweight, GUI-based security tool with out-of-the-box scans

Pros & Cons

Pros

Extensible Plugin Architecture

Core scanning capabilities are modular and expandable via plugins hosted in a separate repository, enabling community-driven enhancements and customization for specific environments.

High-Confidence Vulnerability Detection

Focuses on identifying high-severity vulnerabilities to minimize false positives, prioritizing critical risks for reliable security assessments.

Scalable Foundation for Assessments

Designed as a general-purpose scanner that can be integrated into DevOps pipelines, allowing for scalable and automated security checks across networked systems.

Open Source Transparency

Built and maintained as an open-source project, it encourages community contributions and provides transparency in scanning logic, fostering trust and collaboration.

Cons

Fragmented Plugin Ecosystem

Plugins are maintained in a separate repository, which can lead to inconsistencies, require manual updates, and limit out-of-the-box detection coverage without custom development.

Complex Setup and Configuration

Requires building from source with dependencies like Java and Maven, and configuring plugins separately, making initial deployment non-trivial for teams without security expertise.

Limited Official Support

Disclaimer states it's not an official Google product, which may result in slower updates, less enterprise support, and reliance on community for troubleshooting.

Frequently Asked Questions

Quick Stats

Stars8,566
Forks920
Contributors0
Open Issues4
Last commit8 days ago
CreatedSince 2020

Tags

#infrastructure-security#plugin-system#vulnerability-scanner#open-source-security#security-auditing#network-security

Included in

Static Analysis & Code Quality14.5kCybersecurity Blue Team5.2k
Auto-fetched 1 day ago

Related Projects

GitleaksGitleaks

Find secrets with Gitleaks 🔑

Stars26,224
Forks1,997
Last commit1 month ago
Haskell Dockerfile LinterHaskell Dockerfile Linter

Dockerfile linter, validate inline bash, written in Haskell

Stars12,073
Forks491
Last commit7 days ago
GrypeGrype

A vulnerability scanner for container images and filesystems

Stars12,071
Forks788
Last commit2 days ago
clairclair

Vulnerability Static Analysis for Containers

Stars10,970
Forks1,201
Last commit2 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub