Serenade
Serenade is leading in code security and vulnerability scanning.
Check IDE integration availability.
Every tool listed here offers a free tier or freemium plan. No credit card required. · 297 reads
Serenade is leading in code security and vulnerability scanning.
Check IDE integration availability.
Skybox AI is leading in code security and vulnerability scanning.
Check IDE integration availability.
Sleep Cycle is leading in code security and vulnerability scanning.
Check IDE integration availability.
Solar LLM is leading in code security and vulnerability scanning.
Check IDE integration availability.
Enforces access control and policy-based security configurations.
When you need physical security or network isolation.
Enforces access control and policy-based security configurations.
When you need physical security or network isolation.
Enforces access control and policy-based security configurations.
When you need physical security or network isolation.
Enforces access control and policy-based security configurations.
When you need physical security or network isolation.
Enforces security policies and access controls.
When you need authentication only.
Enforces security policies and access controls.
When you need authentication only.
| Tool | Pricing | Verified | Link |
|---|---|---|---|
| Serenade | Free plan available | Checked 6m ago | Try → |
| Skybox AI | Free plan available | Checked 6m ago | Try → |
| Sleep Cycle | Free plan available | Checked 6m ago | Try → |
| Solar LLM | Free plan available | Checked 6m ago | Try → |
| OPA Open Policy Agent | Free plan available | Checked 10m ago | Try → |
| Kyverno Kubernetes Policies | Free plan available | Checked 11m ago | Try → |
| RBAC Role-Based Access Control | Free plan available | Checked 8m ago | Try → |
| Sentry Error Monitoring | Free plan available | Checked 7m ago | Try → |
| Cilium eBPF Networking | Free plan available | Checked 17m ago | Try → |
| Envoy Proxy | Free plan available | Checked 13m ago | Try → |
← All tools for Code security and vulnerability scanning - Vulnerability scanning · ← Back to tasks