Best Vulnerability Scanners for CircleCI

Find and compare the best Vulnerability Scanners for CircleCI in 2025

Use the comparison tool below to compare the top Vulnerability Scanners for CircleCI on the market. You can filter results by user reviews, pricing, features, platform, region, support options, integrations, and more.

  • 1
    Snyk Reviews
    See Software
    Learn More
    Snyk is the leader in developer security. We empower the world’s developers to build secure applications and equip security teams to meet the demands of the digital world. Our developer-first approach ensures organizations can secure all of the critical components of their applications from code to cloud, leading to increased developer productivity, revenue growth, customer satisfaction, cost savings and an overall improved security posture. Snyk is a developer security platform that automatically integrates with a developer’s workflow and is purpose-built for security teams to collaborate with their development teams.
  • 2
    GitGuardian Reviews
    Top Pick
    GitGuardian is a global cybersecurity startup focusing on code security solutions for the DevOps generation. A leader in the market of secrets detection and remediation, its solutions are already used by hundred thousands developers in all industries. GitGuardian helps developers, cloud operation, security and compliance professionals secure software development, define and enforce policies consistently and globally across all their systems. GitGuardian solutions monitor public and private repositories in real-time, detect secrets and alert to allow investigation and quick remediation.
  • 3
    Invicti Reviews
    Invicti (formerly Netsparker) dramatically reduces your risk of being attacked. Automated application security testing that scales like none other. Your team's security problems grow faster than your staff. Security testing automation should be integrated into every step in your SDLC. Automate security tasks to save your team hundreds of hours every month. Identify the critical vulnerabilities and then assign them to remediation. Whether you are running an AppSec, DevOps or DevSecOps program, help security and development teams to get ahead of their workloads. It's difficult to prove that you are doing everything possible to reduce your company's risk without full visibility into your apps, vulnerabilities and remediation efforts. You can find all web assets, even those that have been forgotten or stolen. Our unique dynamic + interactive (DAST+ IAST) scanning method allows you to scan the corners of your apps in a way that other tools cannot.
  • 4
    Crashtest Security Reviews

    Crashtest Security

    Crashtest Security

    €35 per month
    5 Ratings
    Crashtest Security, a SaaS-based security vulnerability scanner, allows agile development teams to ensure continuous security even before reaching Production. Our state-of the-art dynamic application security test (DAST), integrates seamlessly into your development environment and protects multipage and JavaScript applications, as well microservices and APIs. Crashtest Security Suite can be set up in minutes. You will also have advanced crawling options and the ability to automate your security. Crashtest Security can help you keep your code and customers safe by allowing you to see vulnerabilities in the OWASP Top 10.
  • 5
    Wallarm FAST Reviews

    Wallarm FAST

    Wallarm

    $25,000 per year
    Automate security testing in CI/CD. Dynamic security testing can quickly identify vulnerabilities in apps and APIs as fast as your DevOps runs. Automated continuous security allows for high-velocity CI/CD. Integrated testing for every code-build. Security is a set of guardrails. Unified CI workflows to support DevSecOps. Developer friendly. FAST automatically converts functional tests into security tests in CI/CD. A FAST proxy (Docker Container) is used to capture baselines. It then creates and runs a variety of security checks for each build. You can either use the OWASP Top 10, or your own testing policies such as payloads, types of parameters to be tested, and fuzzer settings. Report anomalies and vulnerabilities to the CI pipeline.
  • 6
    Qwiet AI Reviews
    The Fastest Code Analysis. 40X faster scan speeds so developers don't have to wait long for results after submitting a pull request. The Most Accurate Result. Qwiet AI is the only AI with the highest OWASP benchmark score. This is more than triple the commercial average, and more than twice the second highest score. Developer-Centric Security Processes. 96% of developers say that disconnected security and developer workflows hinder their productivity. Implementing developer-centric AppSec workflows decreases mean-time-to-remediation (MTTR), typically by 5X - enhancing both security and developer productivity. Automated Business Logic Flaws in Dev. Identify vulnerabilities unique to your codebase before they reach production. Achieve compliance. Maintain and demonstrate compliance with privacy and security regulations such as SOC 2 PCI-DSS GDPR and CCPA.
  • 7
    VAddy Reviews

    VAddy

    VAddy

    $55 per month
    VAddy makes it easy for developers to become security experts. You can quickly identify vulnerabilities and fix them before they become embedded in your code. VAddy automatically runs as part your existing CI process. VAddy runs after every code update and alerts you if a commit contains vulnerabilities. We have all been in projects where a vulnerability discovered just before release caused the project to be canceled. Ensure that you are always performing high-quality security analyses throughout your development process to avoid any last-minute surprises. VAddy allows you visualize the frequency of security flaws caused by each member of your team or code module. You can quickly identify security problems and increase education to help developers or other team members with poor security knowledge. Our security experts constantly update our diagnostic engine with the latest threats. This allows your team to quickly develop secure applications without needing any domain knowledge.
  • 8
    StackHawk Reviews

    StackHawk

    StackHawk

    $99 per month
    StackHawk checks your services, APIs, and applications for security vulnerabilities. It also looks for exploitable open-source security bugs. Today's engineering teams rely on automated test suites in CI/CD. Why should application security be any other? StackHawk was designed to find vulnerabilities in your pipeline. Built for developers is more that a slogan. It is the ethos behind StackHawk. Application security has changed left. Developers need a tool to review and fix security issues. StackHawk allows application security to keep up with today's engineering teams. You can quickly find vulnerabilities in pull requests and push out fixes while the security tools of yesterday are still waiting for you to run a manual scan. Developers love this security tool, powered by the most widely used open-source security scanner.
  • 9
    Trivy Reviews

    Trivy

    Aqua Security

    Free
    Trivy offers a comprehensive security scanner. Trivy uses scanners to look for security problems and pinpoints the areas where they can be found. Trivy supports all the popular programming languages, platforms, and operating systems. Trivy can be purchased through the most popular distribution channels. Trivy is compatible with many popular platforms. Trivy integrates with many popular tools and apps, so you can easily add safety to your workflow. Find vulnerabilities, misconfigurations and secrets in code repositories and clouds, as well as Kubernetes and containers.
  • 10
    Docker Scout Reviews

    Docker Scout

    Docker

    $5 per month
    Container images are composed of layers and software packages that are vulnerable to vulnerabilities. These vulnerabilities can compromise security of containers and apps. Docker Scout provides a proactive solution to enhance your software supply chain's security. Docker Scout creates a Software Bill of Materials by analyzing your images. The SBOM is compared to a constantly updated vulnerability database in order to pinpoint security vulnerabilities. Docker Scout is an independent service and platform with which you can interact using Docker Desktop and Docker Hub. You can also use the Docker CLI and the Docker Scout Dashboard. Docker Scout facilitates integrations with other systems, including container registries and CI platform. Discover and analyze the composition of your images. Ensure your artifacts are aligned with supply chain best practice.
  • 11
    Oversecured Reviews
    Enterprise vulnerability scanner for Android apps and iOS apps. It allows developers and app owners to secure every new version of their mobile apps by integrating Oversecured in the development process.
  • 12
    Anchore Reviews
    DevSecOps runs at full speed, with deep inspection of container images, and policy-based compliance. Containers are the future of application development in a fast-paced and flexible environment. While adoption is increasing, there are also risks. Anchore allows you to quickly manage, secure and troubleshoot containers without slowing down. It makes container development and deployment secure right from the beginning. Anchore ensures that your containers meet the standards you set. The tools are transparent for developers, easily visible to production, easy to use security, and designed to accommodate the fluid nature of containers. Anchore is a trusted standard for containers. It allows you to certify containers, making them more predictable and protected. You can deploy containers with confidence. A complete container image security solution can help you protect yourself from potential risks.
  • 13
    ThreatStryker Reviews
    Runtime threat assessment, runtime attack analysis, and targeted protection of your infrastructure and applications. Zero-day attacks can be stopped by staying ahead of attackers. Observe attack behavior. ThreatStryker monitors, correlates, learns, and acts to protect your applications. Deepfence ThreatStryker displays a live, interactive, color-coded view on the topology and all processes and containers running. It inspects hosts and containers to find vulnerable components. It also interrogates configuration to identify file system, processes, and network-related misconfigurations. ThreatStryker uses industry and community standards to assess compliance. ThreatStryker conducts a deep inspection of network traffic, system behavior, and application behavior and accumulates suspicious events over time. The events are classified and correlated with known vulnerabilities and suspicious patterns.
  • 14
    ThreatMapper Reviews
    Open source, multi-cloud platform to scan, map, and rank vulnerabilities in containers, images hosts, repositories, and running containers. ThreatMapper detects threats to your applications in production across clouds, Kubernetes and serverless. You cannot secure what you can't see. ThreatMapper automatically discovers your production infrastructure. It can identify and interrogate cloud instances, Kubernetes nodes and serverless resources. This allows you to discover the applications and containers, and map their topology in real time. ThreatMapper allows you to visualize and discover the external and internal attack surfaces for your applications and infrastructure. Bad actors can gain access to your infrastructure by exploiting vulnerabilities in common dependencies. ThreatMapper scans hosts and containers for known vulnerable dependencies. It also takes threat feeds from more than 50 sources.
  • 15
    Veracode Reviews
    Veracode provides a holistic and scalable solution to manage security risk across all your applications. Only one solution can provide visibility into the status of all types of testing, including manual penetration testing, SAST, DAST and SCA.
  • Previous
  • You're on page 1
  • Next