StackShareStackShare
Follow on
StackShare

Discover and share technology stacks from companies around the world.

Product

  • Stacks
  • Tools
  • Companies
  • Feed

Company

  • About
  • Blog
  • Contact

Legal

  • Privacy Policy
  • Terms of Service

© 2025 StackShare. All rights reserved.

API StatusChangelog
NPMScan

NPMScan

#197in Security
Discussions0
Followers1
OverviewDiscussions

What is NPMScan?

Protect your Node.js projects from supply chain attacks. Scan npm packages for malware, crypto-drainers, and security vulnerabilities. Real-time threat intelligence database tracking malicious packages.

NPMScan is a tool in the Security category of a tech stack.

Key Features

Real-time malicious package detection, Deep static analysis for suspicious scripts, Typosquat and impersonation detection, Obfuscated code pattern scanning, Crypto-drainer and wallet-stealer detection, Dependency risk scoring, Abandoned and unmaintained package alerts, Install-script behavior analysis, Malware signature database, Security vulnerability indicators, Zero-setup package scanning, Instant risk report generation, Threat intelligence dashboard, Package metadata trust scoring, Automated reputation and maintainer checks

NPMScan Pros & Cons

Pros of NPMScan

No pros listed yet.

Cons of NPMScan

No cons listed yet.

NPMScan Alternatives & Comparisons

What are some alternatives to NPMScan?

OpenSSL

OpenSSL

It is a robust, commercial-grade, and full-featured toolkit for the Transport Layer Security (TLS) and Secure Sockets Layer (SSL) protocols. It is also a general-purpose cryptography library.

Let's Encrypt

Let's Encrypt

It is a free, automated, and open certificate authority brought to you by the non-profit Internet Security Research Group (ISRG).

Ensighten

Ensighten

Ensighten is a comprehensive website security company, offering next generation compliance, enforcement and client-side protection against data loss, ad injection and intrusion.

AWS Key Management Service

AWS Key Management Service

AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data, and uses Hardware Security Modules (HSMs) to protect the security of your keys. AWS Key Management Service is integrated with other AWS services including Amazon EBS, Amazon S3, and Amazon Redshift. AWS Key Management Service is also integrated with AWS CloudTrail to provide you with logs of all key usage to help meet your regulatory and compliance needs.

AWS WAF

AWS WAF

AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.

Authy

Authy

We make the best rated Two-Factor Authentication smartphone app for consumers, a Rest API for developers and a strong authentication platform for the enterprise.

Try It

Visit Website

Adoption

On StackShare

Companies
0
Developers
0