Code Scanner

Under Tool, Code Scanner groups products that analyze source, dependencies, or committed config and report findings (usually on Pull Requests or in CI). This is the vendor and runner layer; the practice of enforcing standards is Code Linting (adopt as a Technique).

What belongs here:

KindExamples in the garden
PR / repo quality platformsCodacy (assess): aggregated linters, SAST, coverage dashboards
Config / IaC policy runnersConftest (trial): Open Policy Agent tests on Terraform, K8s, etc.
Language-native SAST (future items)Semgrep-class tools when we add them

What does not belong here:

  • Code Linting the technique (how teams enforce style and static rules).
  • Super-Linter and bare ESLint/golangci-lint configs (run via Code Linting + GitHub Actions, not a scanner SKU).
  • DAST against running apps (Zed Attack Proxy (Zap) is dynamic testing, not repo scanning).
  • Unit Testing / Integration Testing (behavior verification).

Garden stance:

Tag a product here when the primary artifact is a scanner service or CLI marketed for security/quality analysis. Tag CI-CD Tools when the product is primarily a pipeline server (Jenkins, Actions).

Trial

Assess